Leading blog on advanced IT solutions for your business
Every year, the information technology trade association
CompTIA issues an industry forecast.
Per research reported by Information Management (IM) magazine, ransomware attacks against healthcare organizations increased by 89% in 2017 compared to the previous year. Researchers reported that more than 3.4 million healthcare records were compromised last year, with nearly a third of major ransomware events affecting 500 or more individuals.
Organizations considered “
covered entities” and their business associates as defined under the Health Information Portability and Accountability Act (
HIPAA) have been required to provide public notification following a breach of “
protected health information” (known by the acronym PHI) for nearly a decade. But as
we reported in a recent post, some small healthcare providers and companies that conduct regular business with them may misunderstand their regulatory obligations and/or believe compliance is optional based on their size or the nature of their operations
What does a consumer electronics exhibition have to do with technology for business? The answer is the phenomenon called the “
consumerization of IT,” which refers to the tendency of tech trends originating in consumer markets to spread rapidly into business organizations. In short, what rolls out at CES in January may rumble through your company by December.
Emerging technologies, such as the cryptocurrency ledger
artificial intelligence (AI), will fuel growth as companies of all shapes and sizes around the globe seek to capitalize on the potential of digital business operations.
Chuckling at these lazy password practices
may be entertaining, but the role compromised credentials plays in cybersecurity
is no laughing matter.
Researchers predict 1.75 billion people – more than 40 percent of the global workforce – will be mobile by the end of this decade.
clean desktops, clean
screens, and similar workspace security measures are being driven by
increased emphasis on breach prevention.
How are businesses, whose very existence depends on having
a secure, efficiently run enterprise, to safeguard their business and
technology interests? Short answer: better
Here are five powerful password usage and management tips that we gleaned from reviewing articles on the topic, including our own posts.
Businesses today confront the challenges of tightening cybersecurity, expanding cloud services and
Last month, one of the world’s largest technology
trade associations, issued a news release identifying five factors that “shaped the
information technology (IT) industry in 2017.
While the Health Information Portability and Accountability Act (HIPAA)
has been in place for years, healthcare providers are still debating
their need for compliance.
Are you getting the full value that you’re paying for in your current managed IT services provider? Here are four telltale signs that justify switching to someone new.
Every time you or one of your employees slings a laptop bag over a
shoulder and hits the road for a business trip or remote working
session, your company tempts disruption.
One out of four companies already have deployed Artificial Intelligence (AI) technologies in their business operations. Here are three ways AI may come to your business in the next few years.
There are four essential cybersecurity threats in today’s digital business environment, per Wade Baker, associate professor of integrated security at Virginia Tech’s Business Information Technology program:
Managing cybersecurity without expert support is a continuing challenge for any business. Digital technologies enable cyber crooks to operate at any scale – from the quantity offered by a large enterprise to the quality available from a cluster of small firms.
Urgent developments, from both within and outside the legal services industry, provide strong evidence that law firms, in-house legal teams and even solo practitioners need to prioritize cybersecurity–sooner rather than later.
“The cloud offers a variety of benefits,
including the promise of enhanced reliability, flexibility, manageability and
scalability,” columnist John Edwards writes in a recent article for CIO.com.
Web browser detected: Unknown 0.0
We noticed that your web browser is out of date. To get the best possible experience using our site,
we recommend that you upgrade to a newer version. A list of the most popular web browsers can be found below.
By closing this window you acknowledge that your experience on this website may be degraded.