Featured Post

A CFO’s Guide to Purchasing Security Products

In today’s digital world, a brand’s credibility is intrinsically linked to its ability to protect its data and IT infrastructure. This means that to maintain market share, keep customers satisfied and improve profits, choosing the right cybersecurity products is a must.  Deciding which cybersecurity solutions to use was once in the power of CIOs and [...]

Read More...

Electronic Health Records: Necessary Security Safeguards

Second in our HIPAA blog series, this post takes a closer look at HIPAA’s technical safeguards. For starters, there are five technical safeguards as outlined in the HIPAA Security Rule.  The...

EA Data Breach: What Happened, and How it Could be Prevented

Last week, news broke that games publisher Electronic Arts (EA) fell victim to a data breach. While EA won’t say when the incident occurred, the ramifications are clear: the malicious actors made...

Data Breach Risks from Microsoft Teams

Microsoft Teams has rapidly turned out to be the to-go-to application for remote work, accelerating exponentially in usage over the last twelve months. Teams boasts an impressive 145 million active...

Secure Access Service Edge: What is SASE? And Why It’s the Future for Cloud hosted Tech Stacks

The Software-as-a-Service (SaaS) industry is forecast to generate $157 billion by 2022, as more and more organizations move their workloads to the cloud and embrace the world of hybrid...

Subscribe to our newsletter

HIPAA Deep Dive Series: When is a Patient Authorization not needed for Sharing Personal Data?

HIPAA has strict rules governing patient data storage and sharing. However in limited circumstances, the HIPAA Privacy Rule allows a covered entity to use or disclose a patient’s Protected...

What is the Principle of Zero Trust Security?

Zero Trust security is an IT security model centered around the concept that organizations should verify every person and device attempting to access their systems and data, whether they are inside...

Colonial Pipeline Data Breach- Document Malware Likely Cause

Colonial Pipeline got hacked recently. The cyberattack that forced the United States’ largest gasoline pipeline shutdown has triggered fresh questions about the vulnerability of the...

How Remote Work Setups Can Lead to Higher Risks of Sensitive Data Leaks

The benefits of a distributed, remote workforce are plentiful for organizations. From low costs to improved employee wellbeing, it’s easy to see why many companies are planning to let their...

Current Trends in Phishing Emails

Phishing is the single most important risk for employees to introduce malware within organizations. Effective training to spot this risk in incoming emails is table stakes for all organizations, no...

When Documents Attack: Malware Inserted in Attachments

Document-based malware is pretty common these days. An email analysis by Barracuda Networks revealed malware hidden in documents accounts for over 50 percent of all malicious files.  This trend...

Request A Demo For Enterprise Solutions