Does your business work with HIPAA-protected information? If it does, we wanted to discuss the latest legislative changes that affect companies that deal with PHI (personal health information). A new law, called the HIPAA Safe Harbor Law, has been signed to help grant...
CISA, the US Cybersecurity & Infrastructure Security Agency, defines ransomware as an ever-evolving form of malicious software (malware) designed to encrypt files on a device, like a laptop, server, or network file storage, rendering any files and the systems that...
There are many policies that businesses need, and cybersecurity policies are no different. Your company likely has security policies in place for your building and property. For the same reasons, your company also needs cybersecurity policies for your network, data,...
You may already be familiar with antivirus software as you likely use it on your personal computer. Before choosing which antivirus software solution you use, it’s important to know how antivirus works, why you need it, and what threats it protects your devices from....
What is a phishing attack? Scammers can use phishing attacks to trick you to share sensitive information, such as account access details and personal information. Typically, they want to gain money for this effort. Scammers use social engineering to take advantage of...