There are numerous causes of breaches of protected health information (PHI), ranging from human oversights to “high-tech” errors. In April, the Office for Civil Rights (OCR) within the Department of…
Thanks for agreeing to take part in our Expert Interview program! This is a great opportunity to promote yourself as an industry influencer, as well as earn a high-ranking link…
If you’ve done your best to stay away offline for the past two days so you could actually enjoy your weekend, you undoubtedly now find yourself trying to catch up…
Experts are warning that there could be further ransomware cases this week after the global cyber-attack. So, what has happened and how can organisations and individuals protect themselves from such…
AS END-TO-END ENCRYPTED messaging apps have exploded in popularity, several well-known services have added encrypted calls as well. Why not, right? If it works for text-based chat, voice seems like…
Vendors are coming closer to providing the ideal enterprise file sync-and-share products. Most businesses will make back their investments with gains in employee productivity. Businesses and employees can almost universally…
Sharing files with colleagues and clients should be easy and convenient. What it shouldn't be is a security risk — but it frequently is. Because many small businesses don't have…
A little over three months into 2017 and encryption is once again coming into focus. Yesterday, in testimony before the Senate Judiciary Committee, FBI director James Comey was asked about…
Happy World Password Day! If you weren't in the know, the first Thursday in May of each year has been officially declared World Password Day—a day to promote good security…
The disturbing trend of shadow IT continues to pop up in all corners of the enterprise. This is mostly due to the availability of new, easy-to-use applications that have been…