Cybersecurity protocols to protect PHI

August 24th, 2018

Healthcare organizations have always kept the possibility of data breaches in mind, especially since 2017 witnessed the biggest and most expensive data breach to date. To counter this, more businesses have hired certified technicians, but that’s not enough.

4 misconceptions about the Cloud

July 18th, 2018

Cloud computing has proven to be a cost-effective necessity for small businesses. However, there are still many owners who remain misinformed about the intricacies of cloud solutions. Here are some common misconceptions you should stop believing about the cloud.

Chrome to mark HTTP as ‘not secure’

June 14th, 2018

Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will mark all HTTP sites as "not secure.” Google hopes this move will nudge users away from the unencrypted web. Read on to learn more about the forthcoming changes.

The importance of HTTPS

March 7th, 2018

Very few internet users understand the meaning of the padlock icon in their web browser’s address bar. It represents HTTPS, a security feature that authenticates websites and protects the information users submit to them. Let’s go over some user-friendly HTTPS best practices to help you surf the web safely.

Phishers use encrypted sites to scam

December 22nd, 2017

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudulent sites may have HTTPS on their address, giving users a false sense of security.

Cybersecurity Essentials: VPN

December 6th, 2017

Whether it’s because of government surveillance or cyberattacks, internet users are more concerned than ever about the privacy of their online activities. Unfortunately, security measures like firewalls and antivirus software can’t help you in this case, but there’s one that can: Virtual Private Network (VPN).
What is VPN?
Simply put, a VPN is a group of servers you connect to via the internet.

Beware of healthcare IoT security risks

October 2nd, 2017

The Internet of Things (IoT) has the potential to completely revolutionize the healthcare industry. Innovations like smart pacemakers and fitness trackers monitor patients’ vitals and unearth patterns that can lead to more accurate diagnoses. But like any new technology, it also brings a slew of security risks healthcare professionals need to address.

How will blockchain affect healthcare?

July 31st, 2017

New IT trends are usually equal parts exciting and confusing. Today, that generalization describes blockchain technology perfectly. It’s a complex concept that has the potential to totally revolutionize every industry -- including healthcare. Even if you have no plan to invest in blockchain soon, you need to understand what it is.

How to reduce data loss in Office 365

May 29th, 2017

For businesses, the security of sensitive data is critical. If this information is lost or stolen, it could lead to crippling financial losses, legal disputes, and more importantly, loss of customer trust. And while those of you with Microsoft Office 365 installed have some security and compliance tools, there are still some data protection best practices you need to consider.

Is the government really spying on you?

April 6th, 2017

Wikileaks, the website that anonymously publishes leaked information, recently released a number of documents alleging widespread surveillance by the US government. The released documents claim that the vast majority of these efforts took place via smartphones, messaging apps and.