Blog

Five Tips to Deflect a Ransomware Attack

Posted by on October 21, 2019 in Security

Five Tips to Deflect a Ransomware Attack

Ransomware is malicious software designed to lock computers or data storage until a ransom is paid – keyword malicious. The cyber-criminals who write the code for these attacks mean business, to the tune of millions of dollars lost annually. Here are five tips that could help deflect a ransomware attack on your small to medium sized business.

read more

Three Important Steps to Stronger HIPAA Compliance

Posted by on August 23, 2019 in Healthcare

Three Important Steps to Stronger HIPAA Compliance

The Health Insurance Portability and Accountability Act (HIPAA) can be a challenge for healthcare providers of all sizes, especially small and midsize ones that lack the in-house resources to dedicate to enforcing consistent HIPAA compliance.

read more

5 Tips to Spot a Phishing Email

Posted by on July 24, 2019 in Security

5 Tips to Spot a Phishing Email

Phishing emails are an attempt to obtain sensitive or personal information such as usernames, passwords, financial or personal details by scammers who have disguised themselves as a legitimate business or person. The intent is to use this information for illegal purposes. While the hacking world is constantly changing and evolving its methods to fool the end user, below are 5 things to look for that are immediate red flags an email is a phish.

read more

The Dark Web is Making Businesses Less Secure

Posted by on June 13, 2019 in Security

The Dark Web is Making Businesses Less Secure

What many businesspeople might not understand is the role that the Dark Web plays in driving these threats. By providing criminals a safe place to exchange information and access the resources they need, the Dark Web helps perpetuate and spread many of the most dangerous threats sweeping the Internet, leading to direct financial damage on businesses in Ohio and elsewhere.

read more

4 Ways to Protect Your Business from IoT Vulnerabilities

Posted by on May 23, 2019 in Security

4 Ways to Protect Your Business from IoT Vulnerabilities

Welcome to 2019; where the Internet of Things (IoT) is, well, a common thing now. The phrase, coined all the way back in 1999 by Kevin Ashton refers to the subcategory of devices that have computing mechanisms embedded in them to send and receive data via the Internet. Smart locks, smart mirrors, Alexa, home monitoring systems and on and on. The list of qualifying and life improving must have’s is ever growing. The impact of utilizing these devices has far reaching implications as well.

read more