by Martin Scott | Jan 19, 2021 | HIPAA
9 Common HIPAA Violations WE SIMPLIFY HIPAA COMPLIANCE, SO YOU CAN FOCUS ON HEALTHCARE & YOUR BUSINESS! It’s important to be HIPAA compliant if your company or application handles Protected Health Information (PHI) and/or Electronic protected health information...
by Martin Scott | Jan 4, 2021 | Email Security
A common misconception for any business is that the purchase of cybersecurity software means you’re secure – but that is wrong.We talk to companies every day who are aware of the importance of having security software and defenses. But it’s not enough to...
by Martin Scott | Jan 4, 2021 | Cybersecurity
The answer is simple. Failing to do the basics. Is your business aware of the cybersecurity basics and what to do? Which way(s) are you vulnerable? Contrary to popular belief, it’s not the world’s most elite hackers attacking companies –...
by Martin Scott | Jan 4, 2021 | Cybersecurity
When attackers decide to attack your business, they start with scanning your external resources that are publicly available to look for vulnerabilities. They can find out your email provider, your website host, and your domain host. From just these 3 items, attackers...
by Martin Scott | Jan 4, 2021 | Cybersecurity
My favorite New Year’s Resolution I hear from CEOs & Managers is to increase cybersecurity for their company. Here’s 5 Tips for a Safe & Secure New Year! Provide Cybersecurity Awareness Training & SimulationsA preventable employee mistake is involved in...
by Martin Scott | Jan 4, 2021 | Remote/WFH Security
Most office employees will continue to work from home at the beginning of 2021, using their work computer while they are often distracted with household interruptions/emergencies, children, pets, shopping, streaming sports, news, movies, etc. Many times, employees...
by Martin Scott | Jan 3, 2021 | Cybersecurity
Ransomware is a type of malware that encrypts a company’s or victim’s data, making it unreadable. The company or victim is instructed to pay a ransom in order to get access to their data. The first thing you should do if you are hit with a ransomware...
by Martin Scott | Oct 12, 2020 | Email Security
Cloud platforms such as Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), etc. allow for the rapid creation and management of data storage and cloud resources. The problem with this is that most organizations don’t keep track of these...