[vc_row][vc_column][vc_column_text]There used to be two certainties in life: death and taxes. We think it's time to update the saying and include cybersecurity breaches. While computers and the internet have undoubtedly improved our productivity, they have also made...
Data Security
Cybersecurity News: Google Doc Phishing Issue Follow Up
[vc_row][vc_column][vc_column_text]Yesterday was a bad day for some Google users. News spread quickly about a phishing attack within the Google system. Estimates now say only 0.1% of users were affected. But, at a billion users, that still equates to a million people...
May the Fourth Protect You – It’s World Password Day
[vc_row][vc_column][vc_column_text]The 4th of May has been celebrated by Star Wars geeks for several decades. When spoken, the date bears a strong resemblance to the saying, "May the Force be with you." This year, there's another holiday worth geeky celebration...
EMV Adoption Leads to Surge in E-Commerce Fraud
[vc_row][vc_column][vc_column_text] EMV chip cards and readers were only introduced in the US in October of 2015. Yet, you already have chip cards in your wallet and use them daily. You also know, all too well, the growing pains associated with introducing this new...
It’s Your Fault That Employees Are Largest Data Security Threat
[vc_row][vc_column][vc_column_text]Security breaches are becoming more of a promise than a threat. It is not a matter of if, it's a matter of when. According to the Identity Theft Resource report, there have already been 300+ breaches that involved a total of over 1.3...
Do These BEFORE Getting Online with a New PC to Keep Data Secure
[vc_row][vc_column][vc_column_text]Getting a new PC or laptop is a blessing and a curse. It's a blessing in that you get a clean slate, a fresh start. None of the old junk cluttering up your shiny new hard drive. It works at its absolute best. The curse comes when you...
Staff Must Be Included In HIPAA Risk Assessment, Not Just EHR
[vc_row][vc_column][vc_column_text]With the proliferation of mobile and cloud computing, data security threats are a constant state of things, especially in health care. Cloud storage of electronic health records (EHR) has helped to improve quality and efficiency of...
[Infographic] The Beastly IT Security Threats – A MUST READ
[vc_row][vc_column][vc_column_text]Data and IT Security are at the forefront of everyone's concerns these days. The news is overrun with headlines about breaches of corporations that you'd imagine would have tremendous security measures in place, but still fall victim...
Don’t Just Pitch Your Old Computer, Protect Your Data Security
There is a never ending, revolving door of new technology these days. In with the new and out with the old happens a lot quicker than it used to when it comes to IT hardware. When you get a new PC, do you just throw the old one in the trash? Absolutely not. It's bad...
Is Your Data Security Budget a Waste of Money?
[vc_row][vc_column][vc_column_text]When you look at your total IT budget, how much is dedicated to data security? Have you increased that budget in the last couple of years? Most companies have in response to the growing number of cybersecurity threats that have...