During the shift to enable hybrid and work-from-home for many businesses, cybercriminals and scammers have tried to exploit every possible vulnerability they could find. Thanks to security features included with Windows 11, the window for many of their tactics is rapidly closing. Still, some old classics manage to find their way back to our hearts […]
About The Editor
This author has yet to write their bio.Meanwhile lets just say that we are proud The Editor contributed a whooping 81 entries.
Entries by The Editor
Managing your IT network is a full-time job (sometimes many) and you already have a full-time job. In this eBook, we will illuminate the many reasons for foregoing self-management of your IT network in favor of partnering with a managed services provider that can help you meet your business goals.
October is National Cybersecurity Awareness Month, and this week, are highlighting multi-factor authentication as one of the most effective tools to protect patient data and your organization. Also known as two-factor authentication and two-step verification, multi-factor authentication (MFA) is a security measure that requires anyone logging into an account to navigate a two-step process to […]
This article is part of RWA’s series on the 10 Best Health Industry Cybersecurity Practices.Learn more at HHS 405(d) HICP website. Medical devices are essential to diagnostic, therapeutic and treatment practices – but as with all technologies, medical device benefits are accompanied by cybersecurity challenges. Vulnerabilities are sometimes introduced when medical devices connect to the […]
This article is part of RWA’s series on the 10 Best Health Industry Cybersecurity Practices.Learn more at HHS 405(d) HICP website. Over the past decade, one of the greatest changes in addressing cyberattacks involves establishing and implementing cybersecurity policies, procedures, and processes. These policies set expectations and foster a consistent adoption of behaviors by your […]
This article is part of RWA’s series on the 10 Best Health Industry Cybersecurity Practices.Learn more at HHS 405(d) HICP website. In medicine, federal law requires an organization’s endpoints to be protected and hardened against attack. Your endpoint devices typically include desktops, laptops, mobile devices, printers, and computerized medical equipment. Federal regulations also require encrypted […]
This article is part of RWA’s series on the 10 Best Health Industry Cybersecurity Practices.Learn more at HHS 405(d) HICP website. The two most common phishing methods occur through e-mail access. Credential Theft – An attacker attempts to trick targets into providing access through received e-mail. Typically, this takes the form of links in […]
This past week, we learned of the most notable Supreme Court information leak in history. While we are going to steer clear of the political ramifications about the pending ruling, we have to ask… Could the document leak have been prevented with modern technology? A decade ago, probably not. Today… there’s not much of an […]
HIPAA sets the standard for protecting sensitive data. All businesses dealing with protected health information (PHI) are required to make sure that physical, network, and administrative security measures are kept in compliance. Learn what standards have to be met for sending HIPAA compliant email.
At the risk of sounding alarmist, our typical duties and responsibilities as a Managed Service Provider involves analyzing connection and activity logs and – sometimes – blocking potentially unwanted activity. A few of our customers still use passwords instead of Multi-Factor Authentication. If that customer only operates in Denton from 7AM to 6PM, then it’s […]