<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

Telehealth, Video Tech Tools and HIPAA Compliance

Telemedicine has been around for years, but as a healthcare service it has been underutilized. Today, virtual visits[…]

Does the HIPAA Privacy Rule apply to the Novel Coronavirus (COVID-19)?

The Novel Coronavirus is officially a global pandemic. The World Health Organization says that a pandemic is the[…]

Malware and COVID-19: What You Need to Know

Since the COVID-19 outbreak, hackers have been exploiting the public's worst fears and the need to seek relevant[…]

Five Tips to Enhance Telecommuting Security

Let’s face it – telecommuting is on the rise. Yes, COVID-19 has changed the short-term decisions that businesses make[…]

How to Reduce the Cybersecurity Gap in IT

Recently I attended the ISACA 13th Annual WOW Conference with my team. While there I gained a ton of knowledge from[…]

Quarantine Times 2020, a Playlist for Uncertain Times

We know that times of uncertainty can be bewildering, so we wanted to share with you Quarantine Times 2020, a playlist[…]

Too Many Passwords? Foresight 2020: Simplify Security - Single Sign-On

Have you ever been frustrated because you have forgotten your password when logging into your email, social media, or[…]

Cybersecurity Meets Culture: Advice for Executives

Promoting a cybersecurity culture across your organization is simply good business sense. A solid one can make an[…]

Foresight 2020: Why Multi-Factor Authentication is a Must

It's Saturday afternoon. You're at the grocery store, standing in line at the check out as you typically do. The[…]

Tips: How to Ensure Chain of Custody After a Cybersecurity Incident

With the rise of connected devices, digital evidence has become increasingly more common in legal proceedings after a[…]
Subscribe to our Blog!