Monthly Archives: February 2019
Best Wireless Access Point Is The UniFi UAP AC Pro
The best wireless access point in my option is the Ubiquiti UniFi UAP AC Pro. You get Enterprise grade equipment for the fraction of the cost. I have been deploying these access points for 3+ years and feedback from clients are nothing but great. They provide awesome coverage and they have great performance. The The…
HIPAA Compliance Checklist
Are you looking for a HIPAA Compliance Checklist to self-evaluate your practice or organization? I have created an easy to read document that does just that. This HIPAA Compliance Checklist was built upon a previous post called: HIPAA Compliance Program Tips which spoke about The Seven Fundamental Elements of an Effective Compliance Program Implementing written…
TOP 10 Gaming 1TB SSDs for Feb 2019
Here are the TOP 10 Cost Effective Gaming 1TB SSD’s for Feb 2019. If your a real gamer you know the way to go is having a Great SSD in your rig! Who doesn’t need 1TB of storage now a days? Today’s Games have evolved so much that they take massive amounts of storage so…
Critical vulnerability in WordPress plugin Simple Social Buttons
There is a critical vulnerability in the WordPress plugin called Simple Social Buttons. The vulnerability can be used to enable a non-admin user to modify your WordPress installation and allow them to take over your website. So what is the issue here? The researchers with WebARX stated on Monday (2-11-19) that the vulnerability results from…
HIPAA COMPLIANCE PROGRAM TIPS
Here are the Fundamental and Practical Tips for achieving HIPAA compliance with your organization. The Seven Fundamental Elements of an Effective Compliance Program Implementing written policies, procedures and standards of conduct. Designating a compliance officer and compliance committee. Conducting effective training and education. Developing effective lines of communication. Conducting internal monitoring and auditing. Enforcing standards…
Slack has upcoming HIPAA Compliant Features
Slack has been working hard and now have some upcoming HIPAA Compliant Features in the works. So far their file upload service is the only feature that is HIPAA compliant. Let’s not shy away from the vendor just yet because after all they are NIST complaint and which plays a roll into HIPAA. Since…
Remote Desktop Protocol Has Plenty Code-Execution Flaws
Remote Desktop Protocol has plenty of code-execution flaws in both open-source RDP and Microsoft’s RDP client. This makes it possible for a malicious hackers to infect a client computer and then allow them to intrude into the IT network as a whole. What IS RDP? Remote Desktop Protocol (RDP) is a proprietary protocol developed by…
Why You Need Security Education and Awareness Training.
One of the greatest threats to information security could actually come from within your company or organization. Inside ‘attacks’ have been noted to be some of the most dangerous. It is not always disgruntled workers who are a threat. Often, it is the non-malicious, uninformed employees. 1. It is the first line of defense against…
New SpeakUp Backdoor Infects Linux and MacOS
A new malware campaign has been found containing a new Backdoor Trojan called SpeakUp and they are targeting Linux Servers and MacOS by exploiting vulnerabilities in their systems. Check Point researchers stated that the malware campaign attacks Linux servers from all over the world using the CVE-2018-20062 ThinkPHP remote code execution vulnerability as an initial infection vector….
The Decorating Website Houzz Was Breached
The decorating website called Houzz stated that account usernames and passwords have been compromised by an unknown source. They also mentioned if their users also logged into Houzz using Facebook, their user’s public Facebook ID was exposed as well. Houzz quickly sent emails to their users base to urge them to change their passwords. “Houzz…