Fighting Phishing: How to Spot Email Scams

Each day your inboxes are flooded with email after email, some from people you know, others from companies of which you are familiar. Some emails that make their way into your inbox are typical and expected, while others are so outlandish that they would be foolish to even think twice about. A free trip to […]

Top 5 Cybersecurity Threats to Electronic Health Records and Electronic Medical Records

Electronic Health Records (EHRs) and Electronic Medical Records (EMRs) contain a massive amount of sensitive information about a patient’s identity, medical health, and medical history. And while these electronic records allow physicians, healthcare professionals, and insurance companies to share information — a process that makes it easier to provide cross-coverage care and bill insurance — […]

Quick Tips for Protecting Your Privacy on Facebook

In case you haven’t heard, Facebook is in some hot water currently. Why? Because its use of users’ personal data has been called into question, resulting in Facebook CEO Mark Zuckerberg’s appearance before Congress earlier this month. Here’s a little bit of backstory on what is now being referred to as the Cambridge Analytica scandal. […]

Avoid Cyber Attacks: Train Users on Digital Security

Unfortunately, we are not born understanding cybersecurity. For some of us, spotting threats is easier than for others. Users who are not well versed on computer viruses or hacking tricks are more likely to fall victim to these cybersecurity threats, which can be a huge problem if they infect a computer running on a company […]

Use Managed IT Solutions to Grow Your Small Business

Starting a new business is scary, no matter what industry you’re entering. Creating a business from scratch comes with a long list of things to do and things to worry about — from thinking about market potential to preparing a business plan and running risk analysis, small business owners have a lot of their plate. […]

Serious Cyber Threats On The Horizon for Businesses and Enterprises: NSA Hacking Tools Leaked Online

In April 2017, a “collection of spy tools allegedly used by the National Security Agency” (NSA) were stolen and leaked online by a group of anonymous hackers calling themselves the Shadow Brokers. These tools, called “exploits,” are software tools designed to take advantage of a flaw in a computer system, typically for malicious purposes, such […]

The NotPetya Ransomware Attack

If you thought the world was safe from vicious ransomware attacks after the WannaCry attack, and its subsequent patch, you were wrong. On June 27, 2017, a possible strain of the Petya ransomware virus (which has been around since 2016) started propagating and infecting organizations in Ukraine, specifically Ukrainian government and business systems, before spreading […]