Threat Center
Mac Threats Growing Faster than Windows Counterparts
For years, Mac users have been comforted by the idea that Mac products are more secure than their Windows Counterparts. That trend may be over.…
Your COVID-19 HIPAA Guide: Navigating Telehealth, Compliance Changes, and a Remote Workforce
Your COVID-19 HIPAA Guide: Navigating Telehealth, Compliance Changes, and a Remote Workforce As we come to grips with our new reality during the Coronavirus, the…
Physical IT Risk from Malicious Contractors
We often pose the question on our blogs about how secure a business computer system really is in regard to cyber attacks. We offer suggestions…
Keeping Electronic Medical Records (EMR) and Electronic Health Records (EHR) Safe
The vast majority of dental and medical practices have switched from paper records to electronic medical records in an effort to provide better patient care…
The Importance of Detecting a Data Breach
In our last blog we discussed three of the top causes of data breaches and how to prevent them, both at home and at your…
What is the Most Common Cause of Data Breaches?
When we think about data breaches, we often envision a masked man sitting in the dark hacking his way into our personal and business data.…