HIPAA Is Celebrating 20 Years. Are You Any Safer Now?

HIPAA Is Celebrating 20 Years. Are You Any Safer Now?

The HIPAA security rule recently passed the 20 year mark. Has security changed much in that time? The cyber landscape 20 years has evolved considerably in the past two decades. Times certainly have...

Read More >
Are IT Security And IT Compliance One And The Same?

Are IT Security And IT Compliance One And The Same?

Why security and compliance go hand in hand to keep your office safe. For many organizations, it’s really hard to define the line between IT security and IT compliance. IT security has increasingly...

Read More >
How HIPAA Fines Jeopardize Your Business Continuity

How HIPAA Fines Jeopardize Your Business Continuity

Health and Human Services (HHS) Office for Civil Rights has been targeting medical facilities that are not abiding by HIPAA security standards. In the past year, HHS has hit small practices all the...

Read More >
Does HIPAA Compliance Cover GDPR Data Security Regulations?

Does HIPAA Compliance Cover GDPR Data Security Regulations?

7 Ways GDPR and HIPAA are being confused I hate to break it to you, but data security compliance is getting harder! With the European Union’s new General Data Protection Regulations (GDPR) enacted on...

Read More >
Are You Falling Behind On Security Compliance?

Are You Falling Behind On Security Compliance?

With years of planning, the European Union began enforcing its General Data Protection Regulation (GDPR) on May 25th! While many businesses in the Philadelphia metro may think they don’t need to...

Read More >
Are Your Users Opening Your Business To Ransomware Attacks?

Are Your Users Opening Your Business To Ransomware Attacks?

When the Eagles won the Super Bowl, I’m sure if you live and work around the Philly metro you were excited. So excited that you (or a team member) might not have taken a second thought to open an...

Read More >
Will The Next Big Ransomware Attack Go Undetected?

Will The Next Big Ransomware Attack Go Undetected?

Recent cybersecurity research reveals ransomware that actually mimics other processes on your operating system. Coined “Process Doppelganging”, this new ransom attack uses fileless code injection to...

Read More >
How Cybercriminals Are Upping Their Attacks On Your Business Network

How Cybercriminals Are Upping Their Attacks On Your Business Network

In a time where cyberattacks happen every minute of every day all across the country, most businesses continue to say “can’t happen to me!” But the problem with this mentality is that they—including...

Read More >
Think the Cloud is safer for your business? Think again!

Think the Cloud is safer for your business? Think again!

One of the first things business owners all over the Philadelphia metro tell me when we perform eye-opening security roadmap assessments is “We’re in the cloud. We’re safe, right?” While I wish the...

Read More >
Is Your Business Making Decisions To Protect Your Network?

Is Your Business Making Decisions To Protect Your Network?

The most effective IT security intelligence focuses on strategies that provide your business with security advantages over everyone else, making you hard to become a cyber target. It really doesn’t...

Read More >