Entries by The Editor

‘Tis The Season – Holiday Scams

During the shift to enable hybrid and work-from-home for many businesses, cybercriminals and scammers have tried to exploit every possible vulnerability they could find. Thanks to security features included with Windows 11, the window for many of their tactics is rapidly closing. Still, some old classics manage to find their way back to our hearts […]

Multi-Factor Authentication / Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month, and this week, are highlighting multi-factor authentication as one of the most effective tools to protect patient data and your organization. Also known as two-factor authentication and two-step verification, multi-factor authentication (MFA) is a security measure that requires anyone logging into an account to navigate a two-step process to […]

Medical Device Security

This article is part of RWA’s series on the 10 Best Health Industry Cybersecurity Practices.Learn more at HHS 405(d) HICP website. Medical devices are essential to diagnostic, therapeutic and treatment practices – but as with all technologies, medical device benefits are accompanied by cybersecurity challenges. Vulnerabilities are sometimes introduced when medical devices connect to the […]

Cybersecurity Policies

This article is part of RWA’s series on the 10 Best Health Industry Cybersecurity Practices.Learn more at HHS 405(d) HICP website. Over the past decade, one of the greatest changes in addressing cyberattacks involves establishing and implementing cybersecurity policies, procedures, and processes. These policies set expectations and foster a consistent adoption of behaviors by your […]

Endpoint Protection Systems

This article is part of RWA’s series on the 10 Best Health Industry Cybersecurity Practices.Learn more at HHS 405(d) HICP website. In medicine, federal law requires an organization’s endpoints to be protected and hardened against attack. Your endpoint devices typically include desktops, laptops, mobile devices, printers, and computerized medical equipment. Federal regulations also require encrypted […]

E-mail Protection Systems

This article is part of RWA’s series on the 10 Best Health Industry Cybersecurity Practices.Learn more at HHS 405(d) HICP website. The two most common phishing methods occur through e-mail access. Credential Theft – An attacker attempts to trick targets into providing access through received e-mail.                 Typically, this takes the form of links in […]

Getting Ready for Enterprise Data Protection

This past week, we learned of the most notable Supreme Court information leak in history. While we are going to steer clear of the political ramifications about the pending ruling, we have to ask… Could the document leak have been prevented with modern technology? A decade ago, probably not. Today… there’s not much of an […]

How to send a HIPAA compliant email

HIPAA sets the standard for protecting sensitive data. All businesses dealing with protected health information (PHI) are required to make sure that physical, network, and administrative security measures are kept in compliance. Learn what standards have to be met for sending HIPAA compliant email.

Detecting Foreign and Domestic Invasions

At the risk of sounding alarmist, our typical duties and responsibilities as a Managed Service Provider involves analyzing connection and activity logs and – sometimes – blocking potentially unwanted activity. A few of our customers still use passwords instead of Multi-Factor Authentication. If that customer only operates in Denton from 7AM to 6PM, then it’s […]