August 2022

Lawmakers discuss important steps needed for better healthcare cybersecurity

How the healthcare sector is changing with congressional attention The healthcare sector is no stranger to cyber-attacks. Even before the onset of the Coronavirus pandemic, it was battered and bruised by external threats, due in part to legacy infrastructure and outdated software. But, with COVID-19 and even harrowing geopolitical events, the foundation to launch threat

Lawmakers discuss important steps needed for better healthcare cybersecurity Read More »

What Should You Do to Reduce Risk When Your Mobile Device Goes Missing?

Few things invoke instant panic like a missing smartphone or laptop. These devices hold a good part of our lives. This includes files, personal financials, apps, passwords, pictures, videos, and so much more. The information they hold is more personal than even that which is in your wallet. It’s because of all your digital footprints.

What Should You Do to Reduce Risk When Your Mobile Device Goes Missing? Read More »

Discontinued Technology Tools You Should Not Be Using Any Longer

One constant about technology is that it changes rapidly. Tools that were once staples, like Internet Explorer and Adobe Flash, age out. New tools replace those that are obsolete.  Discontinued technology can leave computers and networks vulnerable to attacks. While older technology may still run fine on your systems that doesn’t mean that it’s okay

Discontinued Technology Tools You Should Not Be Using Any Longer Read More »