img

What Is This Chromium Application That Just Appeared On My Computer?

Have you seen a new application — Chromium — suddenly appear on your computer? It’s likely that if you did not intentionally download it, the app is malware that should be removed immediately. While Chromium is a legitimate product, hackers have been using it to deliver adware and potentially...

Keep Reading

What’s The Healthcare Industry’s Definitive Source To Prevent Data Breaches?

According to HealthITSecurity.com, 15 million patient records were breached in 2018 as hacking and phishing surged. They revealed that the number of breached patient records tripled from 2017, as healthcare data security challenges increased. These were the major causes of breaches in 2018: ...

Keep Reading

Inside The Anatomy Of The Human Firewall

Each year, around 61% of small businesses become the victims of a malware attack. While many small businesses may think no one would ever come after them because of their size, know that over half of the total global attacks hit small businesses and, for thieves, getting access to your systems is...

Keep Reading

How Do You Measure Your Company’s Cybersecurity Effectiveness?

Many companies are finally taking cybersecurity seriously and have implemented programs to meet their organization’s specific needs. Having a program in place, however, is only the first step. Measuring the effectiveness of a cybersecurity plan is equally important. There are several steps a comp...

Keep Reading

How Will Technology Change Healthcare In 2019?

Technology is transforming virtually every industry, and healthcare is no exception. Digital applications are becoming more readily available for patients and providers alike. Analytics and similar tools are allowing doctors to provide more accurate diagnoses and targeted treatments, while research...

Keep Reading

How Do You Strengthen Mobile Policies and Keep Up With HIPAA?

Most healthcare professionals are busy people, running in multiple directions at once. Being able to stay connected and complete projects from a phone, tablet or computer is a huge asset. In fact, most doctors, nurses and technicians will tell you that they couldn’t live without their mobile devic...

Keep Reading

Apple Tech Tip: How To Recover A File You Forgot To Save

It happens to the best of us. You’ve invested serious time and effort into a Microsoft Office file for an upcoming presentation. You may even be moments away from finishing your work. Then it happens: your Mac goes down, hard. Maybe the power goes out, or maybe you get the dreaded “Sad Mac” s...

Keep Reading

Are Best Practices For HIPAA ePHI Security Now Mandatory?

Electronic Protected Health Information (ePHI) has become a prime target for cyber thieves. And that’s because it contains so much more information about an individual than regular data. That makes it worth more money on the Dark Web. Imagine being able to buy the personal health information of...

Keep Reading

What Is Customer Lockbox And Privileged Access Management In Office 365

  Microsoft Office 365 is a suite of services that includes Customer Lockbox and Privileged Access Management. Both tools to assist customers in meeting their compliance obligations and maximizing data security and privacy. These tools are currently only available for customers with Office 365...

Keep Reading

Kansas Addiction Treatment Organization’s Email Hack Leads To Data Breach

When people go to their doctors, they assume their information is protected. They freely and willingly provide personal information, like social security numbers. Their primary concern is their health and so they literally trust their lives in the hands of medical professionals and providers. This ...

Keep Reading