In response to the COVID-19 crisis, nearly all companies and organizations were abruptly forced to transition portions of, and in many cases, their entire workforce to remote work. ...more
The specter of a data breach is an unfortunate reality for anyone that uses a computer. Corporations are obviously large targets, with potentially thousands of employees doing things on computers. Some of those things are...more
12/13/2019
/ Artificial Intelligence ,
California Consumer Privacy Act (CCPA) ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Management ,
Data Privacy ,
General Data Protection Regulation (GDPR) ,
Incident Response Plans ,
Personal Data ,
Personally Identifiable Information ,
PHI ,
Popular ,
Risk Management ,
SHIELD Act
When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more
9/28/2017
/ Best Practices ,
Cell Phones ,
Cybersecurity ,
Data Protection ,
Data Security ,
Email ,
Enhanced Cybersecurity Services ,
Hackers ,
Internet ,
Malware ,
Mobile Devices ,
Passwords ,
Personally Identifiable Information ,
Phishing Scams ,
Popular ,
Scams ,
Spam ,
Wifi
Recently, a widespread global ransomware attack has struck hospitals, communication, and other types of companies and government offices around the world, seizing control of affected computers until the victims pay a ransom. ...more
5/16/2017
/ Bitcoin ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
FBI ,
Hackers ,
Health Care Providers ,
Malware ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
US-CERT