Posts

Cyber Insurance

Cyber Insurance

, , ,
You have secured your data through a Virtual Private Network (VPN), security software, and strong passwords. Your personal and company information is safe, right? In other words, there is no need for Cyber Insurance. Introduction Really? In…
Mobile Device Security

Mobile Device Security

, , ,
Many of our posts have been about IT security, focusing on PCs and laptops. However, with the rapidly changing technology and portability of mobile devices, it is time to focus on mobile device security. With recent global health events resulting…
Is Your Email Secure?

Email Security Best Practices

, , , ,
Whether your business is large or small, the number of emails you send and receive daily is probably quite large. In fact, on average,121 business emails are sent or received by employees every day. Have you taken steps to ensure your email…
Committing Fraud
Social Engineering is a Crime

Social Engineering Attacks

, ,
Have you or one of your employees received an email or phone call asking for company banking information or fake invoice information? If so, that call could have been a Social Engineering Attack known as phishing. Phishing - A Common Social…

Avoid Security Rule Penalties

, , ,
Most everyone has heard of the Health Insurance Portability and Accountability Acct (HIPAA), but unless your company is in the healthcare industry or is considered a covered business entity, you may not know there are two HIPAA rules – the…

The Value in Virtual Private Networks

,
A Virtual Private Network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Wikipedia If…