Tag Search: cybersecurity

How to defend against insider threats

Posted on Tuesday June 05, 2018  |  protected health information, insider threat, hipaa, healthcare, cybersecurity

First off, what is an insider threat in healthcare? An insider threat is an individual inside an organization discovered to have been accessing healthcare records without authorization. Healthcare companies must take steps to reduce the potential for insider threats, which is their top source of security incidents.

 

Government agency finds way to unlock iPhones

Posted on Tuesday March 13, 2018  |  security, leaks, jailbreak, iphone, ios, hackers, cybersecurity, breach, apple

Cellebrite, an Israel-based vendor that works with the U.S. government, has revealed that they've found a way to unlock practically every iPhone available on the market. It appears to be a significant milestone for law enforcement and forensic specialists, yet it's also a potential privacy issue for Apple customers.

 

Are hackers using your PC to mine Bitcoin?

Posted on Thursday February 22, 2018  |  processing power, malware, hijack, hardware, dark web, cybersecurity, cryptojacking, cryptocurrency

Cryptocurrencies like Bitcoin and Monero are so popular because they're secure and potentially worth thousands of dollars. But investors and consumers aren't the only ones interested in them. Hackers are using malicious tactics to steal cryptocurrency, and they're doing it with something called cryptojacking.

 

Fighting ransomware with virtualization

Posted on Friday February 02, 2018  |  virtualization, virtual dr, ransomware, disaster recovery, cybersecurity, business continuity

Ransomware takes your data hostage and demands a payment for its recovery. While it may seem like there's no other choice but to pay the ransom, you should never give in to the hacker's demands. Before the next wave of ransomware comes around, it's important to protect your business with virtual disaster recovery solutions.

 

Data safety: The non-technical way

Posted on Monday January 22, 2018  |  webcam, two factor, easy security, data protection, cybersecurity, authentication

Keeping up with advancements in technology as a business owner is tough, especially when those advancements relate to information security. However, it doesn't have to be. Here are a few physical security tips you can implement to protect your data before calling us!

 

Think before saving logins to your browser

Posted on Tuesday January 09, 2018  |  web browsers, safari, privacy, passwords, firefox, cybersecurity, chrome, auto fill

There are a number of reasons you should be wary of saving your password to a digital platform. Just look at Yahoo’s data breach in 2013, which leaked passwords for three billion people. Even when your password isn’t compromised, saving it to a browser could have serious implications for your privacy.

 

Page:   1234567891011121314151617181920212223242526

Celebrating 35+ Years

Off-Site Cloud Backups

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016