Cyber-Security
Cybersecurity

Why is your organization’s cybersecurity program so important?

Short on time? Listen instead. With an almost constant flow of news about cybersecurity breaches worldwide, it is evi...

DATA CLASSIFICATION–When to Begin
Cybersecurity

DATA CLASSIFICATION–When to Begin?

Short on time? Listen instead. Planning for the security of your data is one of the most proactive and essential step...

Health Application Security
Compliance and Regulatory

Health Application Security and Privacy Concerns Drive Legislative Efforts

In the United States, the protection of personal health information (PHI) is covered by the Health Insurance Portability...

What exactly is cybersecurity
Cybersecurity

What exactly is cybersecurity, and why is it important?

Note: While this post is geared toward providing our clients, it is also essential information for others in business or...

RansomHouse data extortion
Cyber Breach

RansomHouse data extortion group: Pay up, or your data goes on sale!

RansomHouse is a new threat actor group believed to have come together in December of 2021. They have decided to use a n...

Personal Touch/Crossroads Technology Ransomware attack
Cyber Breach

Personal Touch/Crossroads Technology Ransomware attack

Health care providers and insurers in the United States are required to obey the laws and regulations related to providi...

virus or malware
Cyber Breach

How can I tell if my computer has a virus or malware?

One of the biggest questions you might ask yourself when you have problems with your computer or device is: “Do I have a...

RedLine Malware
Cybersecurity

 Storing passwords in the browser allows RedLine Malware to breach private VPN

Cybersecurity has become much more challenging with the push to move workers to remote locations during this pandemic. W...

What are ICS and SCADA
Compliance and Regulatory

What are ICS and SCADA, and how do they impact your medical practice?

The health care industry is an ever-changing field full of advancements, both technical and medical.  It requires a...

What are a hacker's motivations
Cybersecurity

What are a hacker’s motivations?

If you have recently paid attention to the news, I am sure you have heard the term “hacker” at least several times. What...

TPM for Windows 11
Microsoft Quick Tips

TPM for Windows 11–What is it, and what does it do?

Short on time? Listen instead. What is TPM, and what does it do? The TPM as a concept was developed by the Trusted...

Deeply Rooted And Committed From the Top Down
Business

Deeply Rooted And Committed From the Top Down

In cybersecurity, or IT, or any job today, it can be tough to find a place to work that makes you feel like you are wher...