top of page
Search
Feb 7, 20203 min read
AMA sees surge in health IT adoption, 'rise of the digital-native physician'
Its new report on emerging technologies sees appetite and aptitude growing for telehealth and virtual visits, remote patient monitoring, cli
33 views0 comments
Jun 24, 20194 min read
Healthcare Data is a Hot Commodity for Hackers
The healthcare industry is high on hackers’ hit lists due to the volumes of sensitive personal information ranging from Social Security numb
59 views0 comments
May 14, 20196 min read
The Security of Connected Medical Devices
In few industries is the growth of connected devices so rapid and widespread as it is in the healthcare industry.
62 views0 comments
Mar 20, 20193 min read
Where Should You Invest Your Cybersecurity Budget?
How much your business spends on cybersecurity matters very little. It’s how you spend it that makes a real difference.
46 views0 comments
Feb 21, 20195 min read
Legal IT Security Best Practices
Regardless of size, what are the best practices a firm should follow? The first order of business is to comprehend that security is an essen
38 views0 comments
Jan 10, 20196 min read
Businesses Have the Power to Stop the Data Breach Epidemic
It's inevitable that some consumer data will be stolen through cyberattacks or exposed through errors that accidentally leave informatio
39 views0 comments
Dec 20, 20187 min read
13 data breach predictions for 2019
Data breaches are inevitable. Here are some predictions from industry experts about where, how and why cyber criminals will attempt to break
37 views0 comments
Dec 7, 20183 min read
Hospital Leaders Feel Underprepared for Cybersecurity Threats
According to a new report, both administrators and providers want to better protect patient data but aren’t confident in staffing, awareness
41 views0 comments
Dec 3, 20185 min read
How secure is your digital presence?
Hacking data is big business for criminals and getting hacked has become “the new normal” for businesses and consumers. Cybercriminals are g
28 views0 comments
Oct 30, 20184 min read
Why website maintenance is essential for small businesses’ cybersecurity
It’s important to have a secure system in place not only to protect your website, but also to ensure that you’re giving potential customers
16 views0 comments
Sep 20, 20182 min read
What is blockchain and how will it affect my business?
Blockchain is a new model for the way data is stored and shared.
36 views0 comments
Aug 9, 20183 min read
Are Biometrics Hackable?
Biometrics are not 100% foolproof -- in terms of accuracy and security. It's still a relatively new technology, but getting more accurat
135 views0 comments
Jul 31, 20184 min read
The Educator’s Guide to Student Data Privacy
The use of digital systems and software in learning institutions sometimes necessitates students to provide personal information which in it
59 views0 comments
Jul 11, 20184 min read
You've Been Hacked: 5 Ways to Minimize the Damage
Getting hacked is a nightmare scenario for every business. Fifty percent of small businesses in the U.S. have experienced a cyberattack. And
38 views0 comments
May 18, 20181 min read
Keep Your Online Identity Safe When Planning a Wedding
Couples are relying on technology more than ever for planning their big day. The below graphic contains some great tips for keeping your...
26 views0 comments
May 3, 20184 min read
5 Ways Smartphones Challenge Mobile Internet Security
Phone users communicate via numerous instant messengers, store data on their devices, conduct financial operations via mobile banking, searc
28 views0 comments
Mar 22, 20184 min read
Stop Facebook from stalking you
The recent bombshell that Cambridge Analytica had collected 50 million Facebook users data with its third party app has many of us wondering
91 views0 comments
Jan 19, 20182 min read
The Importance of Information Security Training
It's important to ensure that personnel have information security training on how to securely process sensitive data, and how to securel
65 views0 comments
Dec 7, 20172 min read
Best Practices: Social Media Accounts
Cyber threat actors target social media accounts in takeover attempts, with the goal of posting fictitious or embarrassing information. Cybe
50 views0 comments
Dec 6, 20172 min read
Tips to Protect Customer Data
We provide a few simple tips to protect customer data and personally identifiable information (PII) that don't involve typical cybersecu
57 views0 comments
bottom of page