Category: Security

Data Security: How Companies Lose Data

As much as companies institute data security policies, they still on occasion, find themselves scrambling to recreate their lost data and repairing their reputation over a data loss or breach.  Here are 3 ways in which companies still lose data and what to do to avoid these common pitfalls. Some employees decide to use their advanced settings… Read more »

Do You Really Have to Update Your Software?

Mobile Devices

Your business should never let important software programs get out of date unless you want to drive your customers away and enrich your competitors. Fortunately, you don’t have to waste a lot of time and money on updating software. In this article, we’ll explore five easy-to-implement solutions to keeping your company up to date. 1.… Read more »

Internet Security Basics for Users

Sometimes, one of the hardest pieces of ensuring internet security for your business is teaching end users how to maintain security on all of their devices.  So many of them have been lulled into a false sense of comfort.  The internet, to them, is an endless source of information and mindless games.  What’s the worst that can… Read more »

Data Security: Protect Yourself Against Ransomware Attacks

The University of Calgary recently paid $20,000 (Canadian) to criminals in order to regain access to its own data. The attackers had encrypted the files on the university’s computer system, and offered to deliver the encryption key required to unlock that data only if a ransom was paid. This was a prototypical ransomware attack, and… Read more »

Three Ways Infrastructure Management Builds Business Revenue

Organizations depend on infrastructure management to streamline their digital processes, provide secure environments for internal and external users, and to adapt to changing business and digital environments. TechTarget reports that IDC researchers found investments in infrastructure “have the largest single impact on an organization’s revenue.” This makes sense considering that an organization’s digital processes bolster the entire organization. Here… Read more »

Proper Encryption Protects Good Businesses from Bad People

Lately, there has been much talk about the role of encryption. Encryption allows one party to send or store information such that only someone with knowledge of a key can read it. The ability to read the message is knowledge-based, not permission-based; keys are typically long numbers which go through a series of mathematical permutations… Read more »

Choosing a Reliable HIPAA Compliant Hosting Provider

  Compliance with the Health Insurance Portability and Accountability Act (HIPAA) is essential for any organizations that fall under its requirements. Penalties for violation are severe. Covered Entities (CEs) include health care providers, health plans, and health care clearinghouses. They need to keep all Protected Health Information (PHI) private and secure. If it’s stored electronically… Read more »

Is Online Technology Compatible With Attorney-Client Privilege?

Many attorneys are hesitant to adopt online technology because of fears that doing so might violate legal ethics. They may go so far as refusing to add a basic online contact form on their website, or they may resist new platforms such as online case management systems that let them remotely share files with clients.… Read more »

Judging Web Application Security

The endless reports of hackers have everyone on edge before they click enter to log into a web application. Cyber criminals are always on the hunt for weaknesses, and when they find one, it may open the whole server to them. The customer needs use only application software that follows the principles of secure design.… Read more »