Questions? Contact Us

 

Latest News

Featured News & Events

The devil in the HIPAA controls details

When it comes to meeting the requirements of the Health Insurance Portability and Accountability Act (HIPAA), there are many potential controls that health care providers can implement to protect themselves against threats that could compromise sensitive data, like patients' electronic personal health records (PHR).Getting a handle on the controls ...
Continue reading
43 Hits
0 Comments

Springtime for hackers

​With blooming flowers, chirping birds and warming temperatures, spring finally arrived in April. But it seems the wonders of nature aren't the only thing that spring brought us. We're also getting fresh reports of hackers who are up to no good.And I'm not talking about Netflix having their shows stolen, held for ransom and released online. While t...
Continue reading
64 Hits
0 Comments

Security in the Cloud: It’s Easier Than You Think

The shift in recent years to cloud computing has put seemingly unlimited computing and data storage capacity at the fingertips of the masses – from the smallest businesses to the largest corporations. Increasingly, there's often little thought put into uploading that next batch of files to the cloud or spinning up that new virtual server, as the bi...
Continue reading
105 Hits
0 Comments

With enforcement on the rise, HIPAA audits take on new meaning

Given the new presidential administration and the unclear fate of the Affordable Care Act, some health care providers (covered entities) may be wondering if Health Insurance Portability and Accountability Act (HIPAA) privacy and security regulations might be falling by the wayside.Recent news suggests that HIPAA audits, which were originally design...
Continue reading
92 Hits
0 Comments

For businesses breached, the meter keeps on running

On March 8, Home Depot agreed to pay a $25 million settlement to a group of banks for damages incurred during the company's massive 2014 data breach. During that breach, email or credit card information was stolen from more than 50 million customers by thieves who hacked store self check-out terminals.It's one of the largest breaches in history, bu...
Continue reading
176 Hits
0 Comments

Our Newsletter

Tag Cloud

Internet Email Security World Backup Day IT Zendzian amazon ec2 Home Depot Breach protect data lamp dsbl Hosting Continuous Monitoring Credit Cards ipad spoofing education shared server Interworx-CP cli malicious software support David Zendzian physical security kerio PCI Compliance pci complliant hosting blackberry TiaraCon iphone business solitions search IT security change security IT services PCI Solutions exchange Las Vegas Geekend QSA Server Mangement DEF CON HIPAA Solutions computing in the cloud Business Solutions OSSEC credit cards stolen Small Business trends Sysadmin Presentation Internet infrastructure backup solutions Reports businesses spf management Medical Records PCI Service Provider password VPS Servers cell phone email Shmoocon InterWorx shared hosting eCommerce Solutions motivation Credit Card Security shared folders windows 7 phishing credit card Internet Corporation Healthcare Records recovering data infrastructure Announcement Firetalk assesment qsa PCI Audit shared secure hosting Health Care Cybersecurity Cybersecurity Ubuntu data breach IT solutions bash vyatta router firewall filter security PCI HIPAA business community Windows Online Business SSL spam video CentOs command line BSides Charleston caller-id eCommerce ZZ Servers Co-Founder smartphone vps business Car Hacking Information Technology Medical Solutions cybersecurity INFOSEC cloud network Web Hosting social engineering embedded compliant hosting ZZ Servers permissions vulnerability scanning anti virus HIPPA small business Control Panel sender policy arduino compliance IT Solutions HIDS Vulnerability cyber security PCI business solutions Compliance HIPAA Cybersecurity Business Solutions Alarm PCI DSS 3.2 dss Hackers Assigned Names hosting control panel mail server Linux Debian Domani Names members area ICANN Xen credit card payment log files apache openssl activesync teensy cyber computer networks TLS information technology physical Cloud Computing cyber liability insurance