Monthly Archives: July 2021
Bringing your own devices such as your personal smart phone, tablet or laptop to the work place could make you a target for cybercriminals. When used for work, your personal devices contain sensitive information, provide a gateway to the corporate … Read the rest
Listen, I know it’s hard out there and there are so many ways to make money that seem legit and we all want an opportunity to make quick money but if you don’t know the signs of a money mule … Read the rest
In this crossword puzzle we will identify a few protected health Information (PHI) words. These words are key to protect ourselves and everyone else that are protected under the Health Insurance Portability and Accountability act (HIPAA).
Click on the link… Read the rest
This quick HIPAA fact sheet will point you in the right direction! Did you know HIPAA, the Health Insurance Portability and Accountability Act was created in 1996? HIPAA is designed to maintain strict privacy over an individual’s health records.
Other … Read the rest
Having a proper cyber security posture is up to all of us. All information created in the company is subject to the behavior of every collaborator. Use complex passwords and don’t share them with anyone. Note the sender’s and recipient’s … Read the rest
This is a simple Kaseya Script to remove the Splashtop agent from workstations and servers.
What does it do?
I am glad you asked. The script uses the Kaseya scripting engine to execute the uninstallation string for the Splashtop agent. … Read the rest
It’s that time again, many of you are going back to school and a proper safety and security checklist will help you for the coming year. Schools hire new Administrative staff and teachers, teachers and students move to new classrooms, … Read the rest
As businesses become more dependent on technology so does the need for digital and physical security. Technology demands a significant amount of physical security to safeguard data, servers, networks and other devices.
Security awareness is not just about preventing cyber … Read the rest
Mobile Attacks statistics show that more than 60% of fraud originates from mobile devices.
Much of the world has gone mobile, and so have mobile attacks. Of the world’s cyberattacks, around 60% are initiated on mobile devices. About 80% of … Read the rest