Intel's year isn't getting off to a very good start. Just after the discovery of a pair of critical vulnerabilities that have been in their chipsets for more than a decade comes the discovery of yet another serious flaw that could impact millions of laptops around the world. A Finnish data security firm called "F-Secure" just reported an issue with Intel's Active Management Technology (AMT) that could allow a hacker to completely bypass the machine's normal login procedure and take control … Read more
Archives for January 2018
Inappropriate Ads Found In Some Game Apps for Kids
Normally, Google's robust series of checks and audits are pretty good at catching malicious code and preventing it from making its way to the Play Store. Sometimes, however, something slips through anyway despite the company's best efforts. This latest one is particularly bad. Researchers from Check Point have identified a new strain of malware called "AdultSwine" lurking in more than sixty gaming apps on the Play Store. Each of these apps has been downloaded between 3 million and 7 million … Read more
Must Know Info For Backup, Security and Disaster Recovery
The Importance of a Proactive, NOT Reactive Approach With the major role information technology plays in the way business is conducted in today's world, it's crucial that every business owner, both large and small, be able to see the big picture of protecting client and company data from disaster. Data backup disaster comes in many forms, from hackers to employee sabotage, to viruses and natural disaster, it's critical to your business operation that you understand the scenarios and solutions … Read more
Is Working on Personal Devices Risky Business?
It's natural and common for your employees to want to conduct some of their work at home or on the road, and often the most convenient way is to do so on their personal devices. However, this could be putting your business at risk, and thus allowing your employees to conduct their work on personal devices could be risky business. The Risk of Not Being Regulated Since your employees personal devices aren't the property of the company, they aren't being properly protected and regulated. And … Read more
6 Ways to Avoid HIPAA Penalties
It looks like the OCR (Office of Civil Rights) is getting in full swing to start auditing for HIPAA violations. There's not a day that goes by where we don't find some entity, large or small, getting breached. The threat is real and it requires action to keep you and your practice protected. Depending upon the issue, HIPAA violations can result in penalties ranging from $100 to $50,000 per violation. Violations that are deemed "willful neglect" result in a minimum fine of $10,000 per … Read more
What is VoIP?
The Void in VoIP Knowledge What is VoIP or voice over Internet protocol? Why is it better than traditional land-line phone service? These are common questions when it comes to the quickly growing VoIP services being implemented by businesses over every size. The simple answer is VoIP services offer a state-of-the-art communication system that allows your business to expand its technology and capabilities, without expanding costs. Turn in the Line for the Web While a traditional telephone call … Read more
You Won’t “LIKE” What Social Media Can Do To Your Business Security and Productivity
More Posting and Less Productivity Employees using company computers to access their favorite news website, social media page or check the score of their fantasy football team is nothing new. The problem is these sites and apps are getting more addicting every day, and employee productivity is dropping at an alarming rate. Even worse, more and more companies are at risk for employees using company resources to access adult websites and gambling websites as well. Create a Policy to Protect … Read more
8 Ways To Keep Your Small Business Secure
If you own and operate a small business, lowering costs is an important part of keeping your company in the black. Cutting costs on your IT budget could inadvertently compromise your company’s security. Even though small businesses may not have all of the resources that large corporations do, they are still just as vulnerable to the same security threats. Here are ways to help secure your small business: 1. Have Anti-virus & Malware Software Every computer is vulnerable to the wide variety … Read more
Is Your BYOD Policy HIPAA Compliant?
Bring Your Own Device or BYOD policies are a great tools for employees and a money saver for companies, but it can also be a risky policy if not conducted properly. Mobile devices and a BYOD policy in the health care field can allow professionals to easily transition workflows, boost productivity and improve communication. The major issue with a BYOD policy in this field is the risk of security breaches leaking personal information and medical records of the patients. This is not only a concern … Read more
Pave the Way for a Successful BYOD Policy
Is your company currently allowing a Bring Your Own Device or BYOD policy for your employees, or considering starting one? While this strategy is a great way to promote productivity and save money for your business, you have to make sure you know the lay of the land before you start allowing a BYOD program at your office. Here are some helpful tips to ensure a BYOD policy is a success and not a regret: Decide On Your Devices Before you open up a BYOD policy, make sure you make it clear to your … Read more