The notion of “we the people” may serve as a hindrance to maintaining cyber security. Recent news has covered threat activity from nation states and hackers outside the US, but what about insider threats that could be taking place right in the workplace cubicle beside you? Minimizing the human threat According to a recent study […]
Read MoreEncryption: How To and Why It’s Important
Posted by Margaret -
-
Cybersecurity, Data Security, Encryption, Firewall, Health Care Data, HIPAA, HIPAA Compliance, Information Technology, IT, Uncategorized
Encryption is the process of protecting personal data, often with a form of “secret code,” so that it cannot be read by anyone who doesn’t have the code key. Today, huge amounts of personal information are managed online, via computer applications, and stored in the cloud, or servers with an ongoing connection to the Web. […]
Read MoreTypes of Common Mobile Threats
Posted by Sherry McCullough -
-
Cybersecurity, Data Security, Firewall, Information Technology, IT, Managed Services, Uncategorized
If you know anything about online security, you know that your phone is even more susceptible to malware than your computer. It gets worse. Once your phone is hacked, your computer can easily be next. That’s because your total online security is only as secure as the weakest link in the chain. When your phone […]
Read More