Cyber Security Explained

These days, it’s not uncommon to wake up in the morning and read headlines like: 300 million user accounts breached after a cyber-attack, Hackers gained access to millions of social security numbers, 500 million personal records were stolen from XYZ hotel servers. An ordinary citizen can assume that, a) he/she [...]

Cyber Security Explained2020-01-12T21:33:04+00:00

Time To ReThink Backup?

Time To ReThink Backup Imagine if life had a rewind button. Make a mistake? Just hit rewind and everything is back to normal. While the chances of any of us experiencing such thing outside of Hollywood movies is ZERO, the ability to use the rewind button in our digital life [...]

Time To ReThink Backup?2020-01-12T21:56:10+00:00

Your Worst Nightmare: Fileless Malware Attack

Your Worst Nightmare: Fileless Malware Attack "By now, everyone pretty much knows what malware is and how it works: Victims receive an email telling them that if they just open the attached PDF, their entire life will morph into heaven on earth. Or they get an email telling them that [...]

Your Worst Nightmare: Fileless Malware Attack2018-08-29T17:11:57+00:00

Google killed 700,000 malicious apps in the Play Store in 2017

If it seems like every day there is news of a malicious Android app being removed from the Google Play Store, your assumption is actually wrong. It’s closer to 2,000 apps per day. Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications. These [...]

Google killed 700,000 malicious apps in the Play Store in 20172018-07-17T22:52:52+00:00

Cryptojacking Up By 8500% in 2017!

What is Cryptojacking? Cryptocurrency is fueling a new kind of cyber attack: cryptojacking. Cryptojacking is the secret use of your computing device to mine cryptocurrency. According to Symantec, Cryptojacking attcks exploded by 8500% in 2017 with Symantec logging 1.7 million in December alone. With only a couple lines of code, [...]

Cryptojacking Up By 8500% in 2017!2018-05-16T03:34:49+00:00

SamSam Ransomware Attack & The City of Atlanta

SamSam Ransomware Attack on the City of Atlanta's Government Systems City officials in Atlanta, Georgia are still trying to recover 10 days after a ransomware attack on municipal computer systems hit at least five out of 13 departments, knocking out some city services and forcing others to revert to paper [...]

SamSam Ransomware Attack & The City of Atlanta2018-04-02T17:00:27+00:00

Business Continuity and Disaster Recovery Planning

Business Continuity and Disaster Recovery Planning Your business’s critical data is always at risk. What kind of risks? How about natural disasters, human errors, hardware failures, and malicious attacks… for starters?! As an informed business owner, you take all the precautionary measures to prevent disasters from happening by keeping your [...]

Business Continuity and Disaster Recovery Planning2020-01-12T21:34:45+00:00

Grow your medical practice, pain free

Grow your medical practice, pain free!   "Growing pain is an unavoidable part of growth", we're all told so. It's easy to simply believe  this old saying and suffer through growth stage. It's a bit hard, however, to pause and think if there’s anything that you could do to ease [...]

Grow your medical practice, pain free2015-06-04T03:23:41+00:00

HIPAA Enforcement – Breaches and Random Audits

HIPAA Enforcement - Breaches and Random Audits Odds of having a HIPAA audit by OCR (Office for Civil Rights) in 2014 or 2015: The good news is OCR announced in February that they will be conducting only 1200 HIPAA audits in 2014 which is really nothing when there are 700,000 [...]

HIPAA Enforcement – Breaches and Random Audits2019-10-30T20:30:56+00:00

3 ways to get your HIPAA Security Risk Assessment (Soft Audit) done

3 ways to get your HIPAA Security Risk Assessment (Soft Audit) done What are the latest buzz words in the healthcare industry? You guessed it, HIPAA Omnibus rules, HIPAA penalties, and of course HIPAA audits. Minimum fine increasing from $10,000.00 to $50,000.00 per violation!!! Is that for REAL? Unfortunately it [...]

3 ways to get your HIPAA Security Risk Assessment (Soft Audit) done2018-01-15T14:42:43+00:00
Go to Top