There are only so many hours in a day, and figuring out how to get the most out of each one is a trick we all wish we could master. Or perhaps more importantly, it’s a trick you…
Operating in the healthcare field requires you to use extra caution when it comes to your technology. Especially with regards to HIPAA compliance. One item that requires special attention is your practice’s data backup protocols. Having a reliable…
On October 21, we learned that the distributed denial-of-service attack has become a vastly greater threat than ever before. By attacking domain name service provider Dyn, a botnet was able to make multiple websites largely unreachable, including Netflix,…
Significant vulnerability may be affecting as many as 700 million Android smartphones and devices RIGHT NOW. The world around us is getting more dangerous all the time, particularly as businesses leap head first into the new digital world…
A discussion of the seven core strategies that insurance companies can use to modernize their IT efforts. When it comes to information technology, the legacy systems of yesterday are very rarely capable of handling the unique challenges of…
It happened on March 19 of this year – campaign chairman for Hillary Clinton John Podesta unwittingly clicked on a link in an email he thought was from Google corporate. It wasn’t from Google, but rather from a…
The use of only passwords – even well-encrypted ones – for login permission is not enough, it seems, to stem the tide serious problem of black hat hacking and unauthorized access. Across the cybersphere, it seems the more…
It used to be that you could safely backup data by taking copies of all of it at regular intervals and putting it on a local backup server, which would then write the data to tape replication which…
If the hack of Yahoo corporate and compromise of hundreds of millions of account users’ data wasn’t enough of a reason to delete your Yahoo account and never look back, how about the fact that former Yahoo CEO…
A new discovery by a Brazilian Infosec research group called Morphus Labs should (once again) make you think twice about clicking on any unsolicited links. Dubbed “Mamba,” the new ransomware strain, like the snake it was named after,…