Back to Blog

Posts for Compliance

people working with computers

The Ultimate List of Best Practices for Computer Security & Computer Care 

July 7, 2021

Maintaining the security of your business can be an overwhelming undertaking. There’s the hardware, software, access controls, passwords, physical security, and administrative safeguards that need to be constantly monitored. And that doesn’t even make a dent in the computer security and care responsibilities that businesses need to worry about.  In response to the staggering amount…

,,,,
fingerprint security

Identity & Access Management: What Is It & Why Does My Organization Need It? 

March 17, 2021

Identity and Access Management (IAM) security is an essential part of any IT department’s security protocols. IAMs manage digital identities and access the rights to data, systems, and resources within an organization. For example, every employee probably has the credentials to login to the workplace server, but not all employees have access rights to all…

,,,
vulnerability sign

Vulnerability: Netlogon Elevation of Privilege

September 23, 2020

Vulnerability: Netlogon Elevation of Privilege In August, Microsoft released a software update to mitigate a critical vulnerability known as Zerologon (CVE-2020-1472) in Windows Server operating systems. This vulnerability was given the highest Common Vulnerability Scoring System (CVSS) score of 10.0 and given a “critical” security rating from Microsoft. The Microsoft Windows Netlogon Remote Protocol (MS-NRPC)…

,,,

Postcard Disguised as Official OCR Communication

August 25, 2020

Postcard Disguised as Official OCR Communication The U.S. Department of Health & Human Services Office for Civil Rights has put out a warning following the discovery that misleading postcards are being sent to health care organizations under the guise of an official OCR announcement. This communication is from a private entity – it is NOT…

,,,,,,,,