Learn from this NFL team’s EMR fumble

News broke recently that the Washington Redskins reported a laptop stolen that contained thousands of medical records for NFL players. The trainer who was responsible for the laptop claims that it did not contain any HIPAA protected data, but the impact remains largely the same. Protected medical information is vulnerable to a host of exposure […]

Threat alert: self-replicating ransomware

The worrisome rise of ransomware doesn’t seem to be slowing as Microsoft recently announced the detection of self-propagating iterations of the malware. With this evolution, it is essential for SMBs to update their understanding of this security threat in order to properly protect themselves. Keep reading to learn how ransomware is continuing to extend its […]

OpenNotes portal initiative gaining steam

A recent initiative to give healthcare patients access to the notes their doctor or clinician writes about their visit is continuing its meteoric rise across the country. OpenNotes began a few years ago by researching the benefits of allowing patients to have access to their doctor’s notes. Since that initial study, the number of healthcare […]

Image uploader security flaw discovered

Unfortunately, we’re confronted with new web security threats every day, and today is no different. Experts have exposed a flaw in ImageMagick, one of the internet’s most commonly used image processors, that could put your site in harm’s way. By learning more about this vulnerability you’ll take the first step toward better protecting your content. […]

4 different types of hackers

Hackers come in all shapes and sizes. From kids trying to gain notoriety on the Internet to political groups trying to send a message, the motives for a cyber attack vary widely. So how can you protect yourself? It all starts with getting to know your enemy a little better. Here’s a profile of four […]

Ransomware alert for healthcare practices

Ransomware is becoming a growing problem for the healthcare industry. And with around a dozen attacks on hospitals being reported since the beginning of the year, you may be wondering just how severe the problem is. Should you be alarmed? How can you protect your practice? Here’s an inside look at how the ransomware epidemic […]

Manage the security risks of virtualization

Virtualization security is a topic that often goes undiscussed on the Internet, and you may even think it’s a non-issue because of this. However, like the rest of your technology, a virtualized infrastructure must be secured. To help keep yours protected, here are some of the security risks involved with virtualization and how you can […]

Should you monitor your employees online?

To monitor your employees, or not to monitor, that is the topic of this blog post today. If you’ve ever considered monitoring your staff’s online activities, you may’ve been lost as to whether or not it’s the right decision. So we’ve listed the pros and cons of doing it, and some tips to make it […]

Office 365 migration security musts

More and more small and medium-sized businesses are making the switch from on-premises SharePoint systems to cloud-hosted Office 365. If you’re one of them, it’s vital to ensure that you put in place adequate protection to counter the security challenges that come with the migration. While many businesses contemplating switching find themselves concerned about the […]