Blog

Tech tips, news, and expert insights

Why the Dark Web Loves PHI

Introduction

Private health information, better known as PHI, refers to all of that confidential patient data stored within health organizations’ physical and digital systems. Although PHI laws initially referred to verbal communication and physical
documents, the onset of the digital age guaranteed swift legislation aimed at covering that digital gap—for instance, the widely recognized Health Insurance Portability and Accountability Act (HIPAA) law of 1996.

If you work for a healthcare organization, or even occasionally contract with one (as a lawyer or tech support might), then you know just how important and confidential the data on your systems really is!

PHI on the Dark Web

PHI is one of the most valuable types of data on the dark web.

Behind the Average Ransomware Attack

Introduction

If you’ve been following this blog for awhile, then you’ve probably heard about the dangers of ransomware a lot. Hopefully, you’ve even picked up a few tips about how to recognize, handle and report ransomware schemes.

Just how bad can these attacks really get, though?

That’s exactly what we’re going to explore here.

The Pros and Cons of MFA

Introduction

How often do you use multi-factor authentication on a daily basis? What about weekly? Monthly? How many MFA codes have you entered the past year?

Whether it’s for work, school or just an account we use for fun, many platforms and applications now require more than just a password to log in!

So, why do security experts insist on using multi-factor authentication (which you may sometimes see referred to as two-factor authentication, TFA or MFA) so strictly and for every account?

Types of MFA

Multi-factor authentication adds an extra layer of security to your accounts, making them much more difficult for attackers to compromise.

Falling for Common Internet Scams?

Introduction

The internet is a vast and ever-changing landscape, and with that comes both good and bad. One of the downsides of the internet is the prevalence of scams. Scammers are constantly coming up with new ways to trick people into giving them
their money or personal information.

The Danger Of Holiday Phishing Scams: How To Recognize And Avoid Them To Stay Safe This Holiday Season

The holiday season is in full swing, which means so are the cybercriminals! While you’re making holiday gift lists, they’re plotting and scheming new ways to take advantage of unsuspecting online shoppers. Holiday phishing scams have become an all-too-common threat, targeting customers to steal personal information, financial data and even identities.

What Should Businesses Pay For IT Support And IT Services?

One of the most common questions we get from new prospective clients calling our office is “What do you guys charge for your IT services?”

While price certainly needs to be one consideration, it’s extremely important you make an informed decision and choose the right IT services company instead of using price as the main deciding factor.

May A Force Field Be With You

“That won’t happen to me” is something many business owners say when discussing cyberscams and the need for adequate protections for their business, but these days it’s getting to be a really, really stupid statement that you definitely don’t want your clients, employees and banker to hear.

What Is Software as a Service?

Introduction

How do you get new software onto your systems?

There are two ways you might get new applications delivered to your system: On-premise and software as a service.

On-premise software is installed and maintained on the customer’s own servers, whereas SaaS software is hosted and managed by a third-party vendor.