New heights in data compliance penalties

If your organization hosts data regulated by the US government, you’re familiar with the scare tactics used to sell hosting services. But what lurks behind those vague threats of expensive lawsuits and unfair liability burdens? HIPAA is nearly 100 pages long and few providers actually know what it requires. Unfortunately, it took a massive breach […]

Benefits of using Skype for Business

Skype for Business (as hinted in the name), is the corporate-oriented version of Skype. Besides the snazzy title, Skype for Business possesses unique office applications that will benefit your company. Yet, many business owners pose the same question: how important is it to adopt Skype for Business? Here are three reasons that might help you […]

Hybrid clouds give flexibility to SMBs

Who would have guessed that clouds could be so complex? Yet in a day and age of seemingly continuous technological advances, “cloud” computing has become one of the more intricate and interesting approaches to managing IT resources for businesses. Not to mention one of the most cost effective, flexible, and secure, thanks in part to […]

WordPress 4.5.3 patches security vulnerabilities

WordPress is one of the most popular and reliable content management systems on the market, and for this reason it is also one of the most frequently targeted platform for hackers. Websites that are running older versions of WordPress are often vulnerable to security breaches and data leaks. Seeking to correct a number of bugs, […]

Microsoft Office 365 ravaged by ransomware

Picture yourself receiving a phone call from kidnappers saying that they have snatched your only child while demanding a ridiculous amount of money for their safety. Now imagine a similar scenario, but this attack is geared towards Microsoft Office 365 users, complete with a ransom note and an audio message informing victims that their files […]

Learn from this NFL team’s EMR fumble

News broke recently that the Washington Redskins reported a laptop stolen that contained thousands of medical records for NFL players. The trainer who was responsible for the laptop claims that it did not contain any HIPAA protected data, but the impact remains largely the same. Protected medical information is vulnerable to a host of exposure […]

Ransomware to begin self-propagation

Although some may have hoped that the threat of ransomware was on the decline, the reality is that it’s quite the opposite. Until now, attacks seemed to be targeted directly at its victims, but Microsoft warns that may no longer be true. With their discovery of self-propagating ransomware it’s vital to fully understand the possible […]

OpenNotes portal initiative gaining steam

A recent initiative to give healthcare patients access to the notes their doctor or clinician writes about their visit is continuing its meteoric rise across the country. OpenNotes began a few years ago by researching the benefits of allowing patients to have access to their doctor’s notes. Since that initial study, the number of healthcare […]

Improve your overall cybersecurity posture by empowering your workforce to recognize and prevent social engineering attacks. Our FREE eBook will teach you how to design and implement a cybersecurity awareness training program that works.Learn more here
+ +