There are many nuances to the Privacy, Security, and Compliance game, not the least of which is controlling access to computer systems on networks that contain Protected Health Information (PHI). There are three simple things that will greatly improve the privacy, security and compliance of any office. Implementing them into your environment in such a manner that work flow efficiency will not be negatively affected, is the critical component in…
Read MoreHow to recognize phishing emails and other social engineering hacker attempts
How to recognize phishing emails and other social engineering hacker attempts Phishing email messages, websites and phone calls are designed to steal your money. Cyber thugs can do this by installing malware on your computer or by stealing personal information from your pc. Cyber criminals also use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. These confidence scams may include a call or email stating…
Read MoreCyber Security Month
Welcome to Cyber Security Month! According to Brian Krebs krebsonsecurity.com there have been 3 major security breaches in the first few days of October 2015. Experian Breach – 15 Million Consumers Scottrade Breach – 4.6 Million Customers Trump Hotel Collection – Unknown number. It’s “safe to say” Cyber Security challenges are here to stay. We’re doing four blog posts this month to coincide with Cyber Security Awareness Month. I thought I’d start…
Read More