Tag Search: cybersecurity

How to safeguard PHI

Posted on Monday January 07, 2019  |  privacy, phi, healthcare, full disk encryption, cybersecurity, anti malware, access policies

Hospital data breaches are emerging at an alarming rate and show no signs of slowing down in 2019. That's because data fetches a hefty price on the black market, making hospitals prime targets for cybercriminals. The best way to defend against these threats is to arm your team with the following systems and protocols.

 

Ransomware wants to get in your Android device

Posted on Monday December 24, 2018  |  ransomware, mobile ransomware, data backups, cybersecurity, android

The increasing usage of mobile devices, specifically by businesses, will naturally entice more hackers to develop mobile ransomware. What is this form of malware, and how can you keep it from invading your Android device?

 

Are your mobile devices protected?

Posted on Wednesday December 12, 2018  |  threats, tags: hardware, smartphone, mobile device, cybersecurity

Businesses have embraced mobile technology, as it allows for constant collaboration, which increases productivity. But as the number of mobile devices used in daily operations grows, so do the incidents of cybercrimes targeting smartphones and tablets. Protect your company mobile devices by following these steps.

 

Not all hackers are cybercriminals

Posted on Wednesday November 28, 2018  |  white hat, hacking, gray hat, cybersecurity, black hat

Newspaper headlines and Hollywood movies have shaped our understanding of computer hackers, but in the real world it's not so simple. Some hackers are making massive contributions to the field of cybersecurity, it just depends on which hat they're wearing that day. Take a few minutes to learn about white, black, and gray hat hackers.

 

Protecting your Android mobile devices

Posted on Wednesday November 21, 2018  |  ransomware, privacy, malware, infosec, information security, cybersecurity, cybercrime, cyber threats, android mobile security, android device

When personal and professional information live on one mobile device, a small breach can have huge impacts. As the adoption of bring your own device (BYOD) policies increase, employee awareness of cyberthreats becomes critical. Here are five tips for avoiding common Android-based security risks.

 

Outdated firmware: An overlooked threat

Posted on Thursday November 08, 2018  |  managed services, software, hardware, routers, operating system, cybersecurity, firmware

If most of your company's computers are obsolete, they double or even triple your chances of experiencing a data breach. This emphasizes how dangerous it is to have outdated applications, operating systems, and even web browsers. Failing to update your firmware could expose your business to major security threats.

 

Page:   1234567891011121314151617181920212223242526

Celebrating 35+ Years

Managed Computer Support Services

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016