Tag Archives: CyberSecurity
What Firewalls To Use To Be HIPAA Compliant
Do you know what firewalls to use to be HIPAA compliant? Is your Network Secure? How is your organization doing with logging? If you don’t know the answer to these questions, you’re not alone. I am going to bluntly state that medical offices need to have a UTM Firewall (Unified Threat Manager Firewall) appliance. These…
The Benefits Of Managed IT Service Providers
Managed IT Services is a term that refers to the practice of outsourcing your company’s IT computer network support and management to improve business operations. Companies that provide these managed services are called Managed Services Providers (MSP). These MSP companies would take the place of a full-time IT professionals that you would normally have on…
FBI Released Public Announcement About Ransomware Threat
The FBI released a new public announcement about the ongoing ransomware threat. They stated that the attacks are becoming more targeted and with losses increasingly more damaging. HOW DOES RANSOMWARE INFECT ITS VICTIMS? The new public message lists the common infection vectors; namely, email phishing campaigns, Remote Desktop Protocol vulnerabilities and software vulnerabilities. IF MY…
Social Media Website Logins Can Compromise Your Account
Many websites are offering alternative login methods but they could potentially compromise your social media account if your not careful. Our attention to internet security has been 110% focus these days. Why use them? Google, Facebook, LinkedIn and Microsoft all offer multi-factor authentication meaning that if someone guesses, steals or cracks your password then they…
Sonicwall Global VPN 5.0 Client Download
Fix slow internet and connection issues with remote computers and users by using the Sonicwall Global VPN 5.0 Client Download. What is SonicWALL Global VPN Client? For secure vpn access to your SonicWALL product, you will need to download and install the GVC client locally on your system. When you configure the vpn on the…
Your vCIO Should Achieve These 10 Technology Priorities For 2020
There are 10 priorities that your vCIO should accomplish for 2020. But if your not sure what a vCIO is or does the term “vCIO” stands for “virtual Chief Information Officer” – basically an outsourced IT department or department head. The idea of outsourced IT is becoming more viable throughout the business world. After all, if…
Point-Of-Sale Malware Found at 102 Checkers Restaurants
Checkers Restaurants suffered a cyber security breach according to a report by ZD Net, the company found Point-Of-Sale malware in 102 Checkers and Rally’s locations. The Checkers released statement emphasizes that “not all Checkers and Rally’s restaurants were affected by this issue.” The business also announced that the Point-Of-Sale malware did not affect all…
Since 2005 some Google G Suite passwords were stored in plaintext
Google says that there were a number of its enterprise customers since 2005 have had their Google G Suite passwords stored in plaintext. G Suite, Google’s brand of cloud computing, software, productivity and collaboration tools has more than 5 million users as of February. Google said that it recently discovered the passwords for a…
Amazon Alexa has some new HIPAA enabled Skills
Amazon Alexa has some new HIPAA Compliant enabled Skills Kit. Covered Entities and their Business Associates, subject to the U.S. Health Insurance Portability and Accountability Act of 1996 (HIPAA), to build Alexa skills that transmit and receive protected health information as part of an invite-only program. There are six new Alexa healthcare skills from industry-leading…
Everyone Needs To Patch 3 Nvidia Driver Flaws
If your a Business, Gamer or a regular awesome person using the Nivida Chipset you definitely need to patch the Nvidia driver as soon as possible because of the following 3 flaws. “[The driver] contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where the product does not properly synchronize shared data,…