Top Menu

Endpoint security: 5 things to know

Endpoint security: 5 things to know

Network security offerings clearly haven’t fixed the endpoint security challenge. The problems come on multiple fronts, which calls for a blended solution. Here’s what you need to know. 1. Antivirus is not enough There’s no argument that antivirus just doesn’t cut it anymore. There’s nothing new here, but it looks like the market is finally […]

Continue Reading
HIPAA Security Reminder of the Week

HIPAA Security Reminder of the Week

Tailgating/Access Card Usage Tailgating is one of the most common physical security breaches. It starts out innocently – an employee opens a door and holds it open for other employees, visitors without badges, or the passive acceptance of a uniformed worker. The problem with these lax situations is that they open your facility to undocumented […]

Continue Reading
Keep business laptops secure

Keep business laptops secure

When it comes to notebook computers, their greatest strength can often seem to be their most profound weakness. The very portability that makes them such useful tools for the mobile professional leaves them vulnerable to a host of catastrophes that never faced the average desktop machine. Fortunately for the IT manager, tools and capabilities to […]

Continue Reading
HIPAA Security Reminder of the Week

HIPAA Security Reminder of the Week

Where do we place servers that store ePHI? When determining the location of servers with PHI or PII, consider these two main factors: physical and environmental protection. Physical protection should be focused on preventing unauthorized individuals from accessing the server (e.g. storing the server in locked room accessible only to staff). Environmental protection should focus on protecting […]

Continue Reading
Computer Security

Beware of the WannaCry Cyber Attack – it’s not over yet!

Overview Below are some frequently asked questions about the WannaCry cyber attack that affected over 150 countries and targeted old Windows systems. Where can I find more information? Refer to the United States Computer Emergency Readiness Team post for complete details: https://www.us-cert.gov/ncas/alerts/TA17-132A How did this attack happen? It was believed that the source of the attack […]

Continue Reading
It is all a cloud

It is all a cloud

One of the hallmarks of business is pragmatism. Effectiveness, rather than dogmatic purity, is prized. That’s demonstrated in the way that businesses are approaching cloud implementations. More and more companies are implementing cloud computing in a hybrid fashion, mixing public cloud, private cloud, and on-premises applications and services to build application infrastructures that combine the […]

Continue Reading
HIPAA Security Reminder of the Week

HIPAA Security Reminder of the Week

Breach of PHI Assessment 4-Factor Requirement Do you think there’s been a breach of PHI?   Follow these guidelines to determine if PHI has been compromised: Look at the nature and extent of the PHI involved, including the types of identifiers and the likelihood of re-identification. Find out who accessed the PHI. Was the person […]

Continue Reading
VDI can work for SMB

VDI can work for SMB

Since the 1990s, some companies have moved the operating system for workstations from the workstation itself to a server providing operating system images for many different workstations. This virtual desktop infrastructure (VDI) has been touted as offering lower cost of ownership for years, yet the majority of workstations in business are still traditional self-hosted operating […]

Continue Reading