Mobile devices have revolutionized the healthcare industry: They’re convenient andRead more "Mobile Devices and HIPAA Compliance"
You’ve heard of ransomware, denial-of-service attacks, and even phishing, butRead more "KRACK Hacks: What You Need To Know"
No matter who they are, people today expect Wi-Fi accessRead more "Guest Wi-Fi 101"
In 2003, a manager at the National Institute of StandardsRead more "Re-secure your passwords!"
When it comes to security, it’s better to be safeRead more "What You Can Learn From Equifax’s Leak"
The Internet of Things (IoT) has the potential to completelyRead more "Beware of Healthcare IoT Security Risks"
With more than 100 million monthly active subscribers, Office 365Read more "New Phishing Scam targets Office 365 Users"
Ever since the WannaCry and Petya outbreaks, healthcare organizations haveRead more "Watch Out! More Ransomware Attacks Incoming"
In 2016, the Locky ransomware infected millions of users withRead more "New Locky ransomware: what you need to know"
Your business may be well-armed against email-based phishing scams, butRead more "How to Protect your VoIP System from Phishing –…