Questions? Contact Us

 

Latest News

Featured News & Events

ZZ Servers Announces Phase One of Scalable Redundant Cloud Infrastructure

ZZ Servers is pleased to announce phase one of our new Scalable Redundant Cloud Infrastructure has been completed, enabling an unprecedented level of performance, scalability and redundancy to our cloud infrastructure. Positive Customer Impact Over the next few months, all existing virtual and cloud infrastructure will be upgraded at no additional ...
Continue reading
1443 Hits
0 Comments

What is gained from Cybersecurity and Physical Security Convergence?

It amazes me that I still sometimes hear people talking about cybersecurity (logical security) and physical security as if they're separate issues to address and manage. Today, in our connected world, that's not the case at all. Our digital world has produced a convergence of physical and logical security that brings value to how you protect your m...
Continue reading
2814 Hits
0 Comments

Tips for Optimizing PCI Compliance

​Sparked by the increase in credit card fraud, PCI DSS compliance went into effect in 2004 to help protect cardholder data. The Payment Card Industry Data Security Standard (PCI DSS) applies to all entities that store, process, and/or transmit cardholder data and those entities that can impact this data. The only exception is Telco Companies that o...
Continue reading
1499 Hits
0 Comments

Five must-haves in any disaster recovery plan

In January the United States saw some of the coldest temperatures on record, an earthquake outside of San Francisco, and mudslides in California. Those Mother Nature events probably didn't affect anyone's computer up time, but they could have. Cold temps produce ice which can break trees and cause damage to equipment; earthquakes can topple buildin...
Continue reading
1334 Hits
0 Comments

Can your business pass the data privacy test?

In addition to being Blueberry Pancake Day, Sunday, Jan. 28, 2018, is Data Privacy Day. Data Privacy Day is led by the National Cyber Security Alliance (NCSA) in the United States. According to NCSA: "Data Privacy Day commemorates the 1981 signing of Convention 108, the first legally binding international treaty dealing with privacy and d...
Continue reading
1233 Hits
0 Comments

Three Practices for Defending Against the Threat from Inside

Cybersecurity Insiders and Crowd Research Partners recently released their "Insider Threat 2018 Report." The report surveyed 472 cybersecurity professionals about their view and position on the threat posed by "insiders" – the employees and partners that have access to an organization's business operating systems and data. The report reminds us tha...
Continue reading
1124 Hits
0 Comments

Two-Factor vs. Multi-Factor Authentication: Which One is Right for You?

By now, most organizations serious about security have implemented some form of two-factor or multi-factor authentication. While both have been around for a long time and widely discussed and debated in security circles, they garnered the spotlight in mainstream media several years ago when Hollywood actresses had their iCloud accounts hacked and t...
Continue reading
1141 Hits
0 Comments

Four Tips for Safe and Secure Holiday Shopping – Buyer Be Aware!

Post-Thanksgiving shopping has changed. Black Friday now begins on Thursday (if not sooner) and the Cyber Monday deals may last all week (or longer). But that doesn't mean you shouldn't take care to protect your personal information and your finances, whether shopping with your feet in the stores or with your fingers online.Here are a few security ...
Continue reading
1419 Hits
0 Comments

Will the Password Ever Go Away?

We have a love/hate relationship with our passwords. We have to love them because they give us access to practically everything necessary in our home and work life – from banking and email accounts to Netflix and school activity accounts. The hate part comes in when we try to recall what password we created for each account – and there are many fro...
Continue reading
1253 Hits
0 Comments

Three Ways to Improve the Security and Reduce the Cost of Password Resets

Using passwords as a primary means of authentication for account logins is not going away soon. Despite the work being done to bring in other authentication mechanisms, passwords are here to stay – at least for the near future.We don't use passwords because they're the most secure option today; we use them because they're convenient and cheap compa...
Continue reading
986 Hits
0 Comments

What’s on your cyber security checklist?

If you're using October – National Cyber Security Awareness Month – to take a hard look at your security practices, policies, procedures and systems, we'd like to offer a starting point for a security checklist, examining some of the key considerations from a people, process and technology viewpoint.People: Disgruntled or uninformed employees are o...
Continue reading
1183 Hits
0 Comments

Kick off National Cyber Security Awareness Month with these nine tips for safer computing

October is National Cyber Security Awareness Month. A collaborative effort between government and industry, National Cyber Security Awareness Month (NCSAM) provides education, information and best practices for staying safe online to consumers, employees, parents and children.Basic tips and advice have been broken down into three key themes: Keep a...
Continue reading
1137 Hits
0 Comments

A provider’s survival guide to HIPAA threat evaluation

Within the Health Insurance Portability and Accountability Act (HIPAA) are two fundamental rules that all covered entities (like health care providers) need to understand and follow.The HIPAA Privacy Rule applies to Protected Health Information (PHI) broadly, and falling under that is the HIPAA Security Rule which focuses on electronic Protected He...
Continue reading
1111 Hits
0 Comments

How to Select a PCI Compliant Managed Service Provider

If you're in business and accepting credit card payments from customers, PCI (Payment Card Industry) compliance is something you need to manage. Whether you're swiping a card every second or just once a month, your business must comply with all of the PCI Data Security Standards (DSS). PCI compliance also applies to many of the third-party service ...
Continue reading
991 Hits
0 Comments

Cybersecurity Awareness Event to Offer Practical Tips on Identity Theft Protection for Individuals and Small Businesses

Local business owners and the general public are invited to a free Cybersecurity Awareness Event on August 17 at 6:30 PM in the Pembroke Office Park Building in Virginia Beach.Industry experts will explain – in layman's terms – why cybersecurity is more important than ever and what practical steps individuals can take to protect themselves from onl...
Continue reading
1494 Hits
0 Comments

WannaCry Ransomware Teaches Painful Lesson in Patch Management

​Irony. A state of affairs or an event that seems deliberately contrary to what one expects and is often amusing as a result.When you think about it, isn't it ironic that we spend a great deal of money on expensive bags, covers and screen protectors to protect the OUTSIDE of our computer devices when the real threat comes from the INSIDE? There's n...
Continue reading
1194 Hits
0 Comments

For HIPAA controls, how O can you go?

There's devil in the details of the various controls organizations use to ensure compliance with the requirements of the Health Insurance Portability and Accountability Act (HIPAA). We highlighted them all in a recent blog post if you want to read more. Broken out as administrative, operational or technical, HIPAA controls refer to the various proc...
Continue reading
1439 Hits
0 Comments

What providers really need to know about HIPAA Title II

The massive Health Insurance Portability and Accountability Act (HIPAA) enacted by congress in 1996 is broken out into five different titles, with Title II being the one most heavily focused on security and privacy. Title II set, for the first time, key standards for electronic health care transactions and national identifiers for providers, health...
Continue reading
1836 Hits
0 Comments

The devil in the HIPAA controls details

When it comes to meeting the requirements of the Health Insurance Portability and Accountability Act (HIPAA), there are many potential controls that health care providers can implement to protect themselves against threats that could compromise sensitive data, like patients' electronic personal health records (PHR).Getting a handle on the controls ...
Continue reading
1182 Hits
0 Comments

Springtime for hackers

​With blooming flowers, chirping birds and warming temperatures, spring finally arrived in April. But it seems the wonders of nature aren't the only thing that spring brought us. We're also getting fresh reports of hackers who are up to no good.And I'm not talking about Netflix having their shows stolen, held for ransom and released online. While t...
Continue reading
1237 Hits
0 Comments

Tag Cloud

hosting control panel members area motivation IT services information technology business community Geekend eCommerce Solutions personal information dss email accounts change Hackers spf cli IT security Charleston spam Server Mangement CentOs PCI Compliance cybersecurity cyber monitoring Presentation blackberry cloud infrastructure cyber Reports amazon ec2 HIPAA businesses Continuous Monitoring PCI DSS 3.2 kerio Windows computer security Control Panel IT solutions Medical Records Alarm shared folders phishing two factor authentication employee training Internet Corporation Hosting PCI Data Security Standards iphone backup solutions social engineering TLS vulnerability scanning qsa PCI compliance Credit Card Security shared hosting PCI Service Provider bash data breach spoofing SSL David Zendzian infrastructure anti virus Security ZZ Servers business solutions GDPR Information Technology healthcare solutions smartphone National Cyber Security Awareness Month HIPAA Solutions command line ipad cyber liability insurance INFOSEC ZZ Servers Co-Founder Compliance World Backup Day PCI Solutions trends Interworx-CP safe computing TiaraCon Announcement health care providers Cybersecurity Business Solutions search Debian Credit Cards Medical Solutions credit card InterWorx physical security Internet infrastructure HIPPA Internet Vulnerability sender policy black friday Cloud Computing cyber protection Web Hosting caller-id cyber monday lamp Las Vegas permissions apache intrusion detection OSSEC cyber security HIDS Health Insurance Portability windows 7 Shmoocon security Business Solutions openssl computing in the cloud pci complliant hosting credit card payment security circles Firetalk malicious software PCI Scalable Redundant Cloud Infrastructure Email Zendzian ICANN Domani Names network BSides arduino Cybersecurity DRP dsbl Home Depot Breach phishing attacks embedded cloud IT Solutions credit cards stolen multi-factor authentication data privacy follow.The HIPAA Privacy Rule data protection Healthcare Records small business VPS Servers Accountability Act teensy PCI Audit mail server Business Planning business solitions vps IT Services Health Care Cybersecurity HIPAA solutions activesync education Online Business Positive Customer Impact Linux DEF CON compliant hosting assesment Xen management compliance support Sysadmin exchange shared secure hosting vyatta router firewall filter security PCI HIPAA physical Payment Card Industry Small Business eCommerce business recovering data Disaster Recovery Plan cell phone email IT video logical security protect data passwords shared server Assigned Names Car Hacking PCI Hosting log files computer networks Ubuntu QSA password