There are countless hackers who get up every morning with ONE goal in mind: to find a new vulnerability in a commonly installed software (like Adobe Flash Player, Java plug in or Google Chrome) to access your computer.
WELCOME TO OUR BLOG
Like it or not, device manufacturers and application publishers LOVE to add bloat that you don’t need to their products. This inevitably creates more security risks AND slows down your device.
(Image credit Peter Swanson, Coffee-channel.com)
So you’re in the car on the way home from Starbucks, when you suddenly realize your laptop has gone missing. You drive back frantically hoping you can find it, only to discover it completely missing. What do you do? That depends…
If you’re using FileShare, Dropbox, Box, OneDrive, Google Drive or other file sync and sharing cloud applications, listen up! While these tools can be very productive and effective, they also can represent a potential vector for data breaches, both intentionally and unintentionally.
Connecting to free public WiFi is incredibly convenient, especially when you have to travel or just have an urgent item that requires your attention.
Whether it’s at the coffee shop, hotel or airport, the temptation to check e-mail and surf the web is just too strong to resist. So BEFORE you connect to any public WiFi where you don't necessarily trust the network, make sure you think about what you are doing, and take some precautions:
(As published in the March/April 2018 issue of MediNews)
Just like every other business on the planet, Medical Practices and other organizations controlling personal health records (PHI) have to deal with personnel changes on a regular basis. New people come in and, for whatever reason, others move on. Many organizations undergo significant shifts. Perhaps the practice expands or contracts. These are all normal things that any manager would anticipate.