What Is Zero Trust? Why Should You Use It For Security?

Think about everything you trust. You trust your employees are doing their jobs. You trust your office manager with the keys to your office. You trust your accountant is filing your taxes. What about your company information that lives in ...

The Challenge In Finding The Right Cybersecurity Team Member

Let’s talk about your cybersecurity team for a moment. Who do you have in place working to keep your data safe and secure? Are they trained to meet today’s demands? Are they doing a competent job? According to an ESG ...

Why Firewalls Won’t Protect Your EHRs

Have you been woo’d by the latest technology that promises to be “the one?” The software program that promises to protect you from everything, or the app that will keep you safe; surely they work, don’t they? All you have ...

What Does A Patch Management System Look Like?

Imagine having a house filled with treasures. It’s a beautiful house, one that everyone admires in the neighborhood. What’s more, people know all the wonderful things inside; you keep them on display for everyone to see. Then you leave for ...

How Outside Data Is Compromising Your EHR Security

Are you one of the many that have joined the personal fitness trackers revolution? The wearables market is exploding, with nearly a quarter of the US population wearing one to track their daily lives. Of course, most of this new ...

How Do You Know If You’re Approaching Cybersecurity The Right Way?

How do you know if your approach to cybersecurity is the right way? How do you know if you’re protecting your data well enough to meet all of the laws and regulations on the books today? The answer may surprise ...

Would You Fall For a Spoofing Attack?

What if someone wants into your practice? What if they want money? What’s the easiest way in? If you said email, you’re correct. And it’s not just the biggest companies that are susceptible. Your practice is more than large enough ...

Have One Of These Devices? Your Data Has Been Compromised

Have you upgraded things around your home and office lately? Chances are you’ve jumped on the IoT bandwagon. The Internet of Things is impacting all kinds of devices in every aspect of our lives. Installed a doorbell cam? Or a ...

The Difference Between A Hack And A Breach

There are lots of ways your data can be compromised. In the news, you may see some stories about data being hacked, while in others they talk about a breach. They are often used interchangeably, but in reality, they are ...

Why Those Cybersecurity Tools May Not Be Keeping You As Safe As You Thought

When was the last time you downloaded a security patch the moment it was released? Hours? Days? Weeks? How vulnerable did that weakness make you while you put off the update? According to tCell’s 2018 Security Report for In-Production Web ...