Questions? Contact Us

 

Latest News

Featured News & Events

ZZ Servers Announces Phase One of Scalable Redundant Cloud Infrastructure

ZZ Servers is pleased to announce phase one of our new Scalable Redundant Cloud Infrastructure has been completed, enabling an unprecedented level of performance, scalability and redundancy to our cloud infrastructure. Positive Customer Impact Over the next few months, all existing virtual and cloud infrastructure will be upgraded at no additional ...
Continue reading
1341 Hits
0 Comments

What is gained from Cybersecurity and Physical Security Convergence?

It amazes me that I still sometimes hear people talking about cybersecurity (logical security) and physical security as if they're separate issues to address and manage. Today, in our connected world, that's not the case at all. Our digital world has produced a convergence of physical and logical security that brings value to how you protect your m...
Continue reading
2631 Hits
0 Comments

Tips for Optimizing PCI Compliance

​Sparked by the increase in credit card fraud, PCI DSS compliance went into effect in 2004 to help protect cardholder data. The Payment Card Industry Data Security Standard (PCI DSS) applies to all entities that store, process, and/or transmit cardholder data and those entities that can impact this data. The only exception is Telco Companies that o...
Continue reading
1461 Hits
0 Comments

Five must-haves in any disaster recovery plan

In January the United States saw some of the coldest temperatures on record, an earthquake outside of San Francisco, and mudslides in California. Those Mother Nature events probably didn't affect anyone's computer up time, but they could have. Cold temps produce ice which can break trees and cause damage to equipment; earthquakes can topple buildin...
Continue reading
1271 Hits
0 Comments

Can your business pass the data privacy test?

In addition to being Blueberry Pancake Day, Sunday, Jan. 28, 2018, is Data Privacy Day. Data Privacy Day is led by the National Cyber Security Alliance (NCSA) in the United States. According to NCSA: "Data Privacy Day commemorates the 1981 signing of Convention 108, the first legally binding international treaty dealing with privacy and d...
Continue reading
1201 Hits
0 Comments

Three Practices for Defending Against the Threat from Inside

Cybersecurity Insiders and Crowd Research Partners recently released their "Insider Threat 2018 Report." The report surveyed 472 cybersecurity professionals about their view and position on the threat posed by "insiders" – the employees and partners that have access to an organization's business operating systems and data. The report reminds us tha...
Continue reading
1089 Hits
0 Comments

Two-Factor vs. Multi-Factor Authentication: Which One is Right for You?

By now, most organizations serious about security have implemented some form of two-factor or multi-factor authentication. While both have been around for a long time and widely discussed and debated in security circles, they garnered the spotlight in mainstream media several years ago when Hollywood actresses had their iCloud accounts hacked and t...
Continue reading
1096 Hits
0 Comments

Four Tips for Safe and Secure Holiday Shopping – Buyer Be Aware!

Post-Thanksgiving shopping has changed. Black Friday now begins on Thursday (if not sooner) and the Cyber Monday deals may last all week (or longer). But that doesn't mean you shouldn't take care to protect your personal information and your finances, whether shopping with your feet in the stores or with your fingers online.Here are a few security ...
Continue reading
1386 Hits
0 Comments

Will the Password Ever Go Away?

We have a love/hate relationship with our passwords. We have to love them because they give us access to practically everything necessary in our home and work life – from banking and email accounts to Netflix and school activity accounts. The hate part comes in when we try to recall what password we created for each account – and there are many fro...
Continue reading
1219 Hits
0 Comments

Three Ways to Improve the Security and Reduce the Cost of Password Resets

Using passwords as a primary means of authentication for account logins is not going away soon. Despite the work being done to bring in other authentication mechanisms, passwords are here to stay – at least for the near future.We don't use passwords because they're the most secure option today; we use them because they're convenient and cheap compa...
Continue reading
957 Hits
0 Comments

What’s on your cyber security checklist?

If you're using October – National Cyber Security Awareness Month – to take a hard look at your security practices, policies, procedures and systems, we'd like to offer a starting point for a security checklist, examining some of the key considerations from a people, process and technology viewpoint.People: Disgruntled or uninformed employees are o...
Continue reading
1139 Hits
0 Comments

Kick off National Cyber Security Awareness Month with these nine tips for safer computing

October is National Cyber Security Awareness Month. A collaborative effort between government and industry, National Cyber Security Awareness Month (NCSAM) provides education, information and best practices for staying safe online to consumers, employees, parents and children.Basic tips and advice have been broken down into three key themes: Keep a...
Continue reading
1108 Hits
0 Comments

A provider’s survival guide to HIPAA threat evaluation

Within the Health Insurance Portability and Accountability Act (HIPAA) are two fundamental rules that all covered entities (like health care providers) need to understand and follow.The HIPAA Privacy Rule applies to Protected Health Information (PHI) broadly, and falling under that is the HIPAA Security Rule which focuses on electronic Protected He...
Continue reading
1078 Hits
0 Comments

How to Select a PCI Compliant Managed Service Provider

If you're in business and accepting credit card payments from customers, PCI (Payment Card Industry) compliance is something you need to manage. Whether you're swiping a card every second or just once a month, your business must comply with all of the PCI Data Security Standards (DSS). PCI compliance also applies to many of the third-party service ...
Continue reading
961 Hits
0 Comments

Cybersecurity Awareness Event to Offer Practical Tips on Identity Theft Protection for Individuals and Small Businesses

Local business owners and the general public are invited to a free Cybersecurity Awareness Event on August 17 at 6:30 PM in the Pembroke Office Park Building in Virginia Beach.Industry experts will explain – in layman's terms – why cybersecurity is more important than ever and what practical steps individuals can take to protect themselves from onl...
Continue reading
1384 Hits
0 Comments

WannaCry Ransomware Teaches Painful Lesson in Patch Management

​Irony. A state of affairs or an event that seems deliberately contrary to what one expects and is often amusing as a result.When you think about it, isn't it ironic that we spend a great deal of money on expensive bags, covers and screen protectors to protect the OUTSIDE of our computer devices when the real threat comes from the INSIDE? There's n...
Continue reading
1163 Hits
0 Comments

For HIPAA controls, how O can you go?

There's devil in the details of the various controls organizations use to ensure compliance with the requirements of the Health Insurance Portability and Accountability Act (HIPAA). We highlighted them all in a recent blog post if you want to read more. Broken out as administrative, operational or technical, HIPAA controls refer to the various proc...
Continue reading
1413 Hits
0 Comments

What providers really need to know about HIPAA Title II

The massive Health Insurance Portability and Accountability Act (HIPAA) enacted by congress in 1996 is broken out into five different titles, with Title II being the one most heavily focused on security and privacy. Title II set, for the first time, key standards for electronic health care transactions and national identifiers for providers, health...
Continue reading
1792 Hits
0 Comments

The devil in the HIPAA controls details

When it comes to meeting the requirements of the Health Insurance Portability and Accountability Act (HIPAA), there are many potential controls that health care providers can implement to protect themselves against threats that could compromise sensitive data, like patients' electronic personal health records (PHR).Getting a handle on the controls ...
Continue reading
1158 Hits
0 Comments

Springtime for hackers

​With blooming flowers, chirping birds and warming temperatures, spring finally arrived in April. But it seems the wonders of nature aren't the only thing that spring brought us. We're also getting fresh reports of hackers who are up to no good.And I'm not talking about Netflix having their shows stolen, held for ransom and released online. While t...
Continue reading
1213 Hits
0 Comments

Tag Cloud

Healthcare Records PCI Data Security Standards pci complliant hosting Information Technology lamp phishing business members area openssl CentOs Medical Solutions OSSEC Online Business vyatta router firewall filter security PCI HIPAA Cloud Computing InterWorx Business Solutions HIPAA solutions healthcare solutions TiaraCon qsa intrusion detection HIPAA Solutions PCI DSS 3.2 log files Health Insurance Portability cyber physical security businesses PCI Solutions eCommerce hosting control panel support social engineering cyber security PCI Hosting QSA PCI Audit ipad command line Security Credit Card Security dsbl Accountability Act IT Services business community security circles cyber liability insurance Internet email accounts cloud infrastructure spf ZZ Servers change Server Mangement recovering data HIPPA Windows vulnerability scanning GDPR data privacy cell phone email Domani Names Linux phishing attacks IT solutions shared server cyber monitoring safe computing data protection IT iphone compliant hosting computer networks Vulnerability caller-id employee training multi-factor authentication Disaster Recovery Plan Internet infrastructure Shmoocon Cybersecurity Business Solutions Control Panel search Hackers Announcement computing in the cloud anti virus BSides PCI business solitions PCI Service Provider shared hosting Hosting teensy Geekend DEF CON Business Planning personal information bash health care providers credit cards stolen National Cyber Security Awareness Month activesync information technology passwords blackberry PCI Compliance spam Charleston amazon ec2 cli Web Hosting HIDS Debian data breach Positive Customer Impact follow.The HIPAA Privacy Rule management credit card embedded network Scalable Redundant Cloud Infrastructure kerio vps malicious software eCommerce Solutions Car Hacking arduino apache Email Presentation Zendzian Las Vegas TLS windows 7 Credit Cards physical David Zendzian mail server trends cyber monday IT security Reports Sysadmin Compliance DRP education ICANN video Assigned Names ZZ Servers Co-Founder sender policy Health Care Cybersecurity security backup solutions two factor authentication Internet Corporation protect data VPS Servers Interworx-CP Payment Card Industry IT services cybersecurity INFOSEC World Backup Day motivation compliance shared folders Xen Home Depot Breach Ubuntu Cybersecurity IT Solutions black friday business solutions Small Business computer security credit card payment Alarm dss shared secure hosting spoofing smartphone logical security Firetalk exchange Medical Records assesment password Continuous Monitoring SSL small business PCI compliance HIPAA cyber protection infrastructure cloud permissions