Questions? Contact Us

 

Latest News

Featured News & Events

ZZ Servers Announces Phase One of Scalable Redundant Cloud Infrastructure

ZZ Servers is pleased to announce phase one of our new Scalable Redundant Cloud Infrastructure has been completed, enabling an unprecedented level of performance, scalability and redundancy to our cloud infrastructure. Positive Customer Impact Over the next few months, all existing virtual and cloud infrastructure will be upgraded at no additional ...
Continue reading
1345 Hits
0 Comments

What is gained from Cybersecurity and Physical Security Convergence?

It amazes me that I still sometimes hear people talking about cybersecurity (logical security) and physical security as if they're separate issues to address and manage. Today, in our connected world, that's not the case at all. Our digital world has produced a convergence of physical and logical security that brings value to how you protect your m...
Continue reading
2642 Hits
0 Comments

Tips for Optimizing PCI Compliance

​Sparked by the increase in credit card fraud, PCI DSS compliance went into effect in 2004 to help protect cardholder data. The Payment Card Industry Data Security Standard (PCI DSS) applies to all entities that store, process, and/or transmit cardholder data and those entities that can impact this data. The only exception is Telco Companies that o...
Continue reading
1463 Hits
0 Comments

Five must-haves in any disaster recovery plan

In January the United States saw some of the coldest temperatures on record, an earthquake outside of San Francisco, and mudslides in California. Those Mother Nature events probably didn't affect anyone's computer up time, but they could have. Cold temps produce ice which can break trees and cause damage to equipment; earthquakes can topple buildin...
Continue reading
1272 Hits
0 Comments

Can your business pass the data privacy test?

In addition to being Blueberry Pancake Day, Sunday, Jan. 28, 2018, is Data Privacy Day. Data Privacy Day is led by the National Cyber Security Alliance (NCSA) in the United States. According to NCSA: "Data Privacy Day commemorates the 1981 signing of Convention 108, the first legally binding international treaty dealing with privacy and d...
Continue reading
1202 Hits
0 Comments

Three Practices for Defending Against the Threat from Inside

Cybersecurity Insiders and Crowd Research Partners recently released their "Insider Threat 2018 Report." The report surveyed 472 cybersecurity professionals about their view and position on the threat posed by "insiders" – the employees and partners that have access to an organization's business operating systems and data. The report reminds us tha...
Continue reading
1090 Hits
0 Comments

Two-Factor vs. Multi-Factor Authentication: Which One is Right for You?

By now, most organizations serious about security have implemented some form of two-factor or multi-factor authentication. While both have been around for a long time and widely discussed and debated in security circles, they garnered the spotlight in mainstream media several years ago when Hollywood actresses had their iCloud accounts hacked and t...
Continue reading
1097 Hits
0 Comments

Four Tips for Safe and Secure Holiday Shopping – Buyer Be Aware!

Post-Thanksgiving shopping has changed. Black Friday now begins on Thursday (if not sooner) and the Cyber Monday deals may last all week (or longer). But that doesn't mean you shouldn't take care to protect your personal information and your finances, whether shopping with your feet in the stores or with your fingers online.Here are a few security ...
Continue reading
1388 Hits
0 Comments

Will the Password Ever Go Away?

We have a love/hate relationship with our passwords. We have to love them because they give us access to practically everything necessary in our home and work life – from banking and email accounts to Netflix and school activity accounts. The hate part comes in when we try to recall what password we created for each account – and there are many fro...
Continue reading
1220 Hits
0 Comments

Three Ways to Improve the Security and Reduce the Cost of Password Resets

Using passwords as a primary means of authentication for account logins is not going away soon. Despite the work being done to bring in other authentication mechanisms, passwords are here to stay – at least for the near future.We don't use passwords because they're the most secure option today; we use them because they're convenient and cheap compa...
Continue reading
958 Hits
0 Comments

What’s on your cyber security checklist?

If you're using October – National Cyber Security Awareness Month – to take a hard look at your security practices, policies, procedures and systems, we'd like to offer a starting point for a security checklist, examining some of the key considerations from a people, process and technology viewpoint.People: Disgruntled or uninformed employees are o...
Continue reading
1140 Hits
0 Comments

Kick off National Cyber Security Awareness Month with these nine tips for safer computing

October is National Cyber Security Awareness Month. A collaborative effort between government and industry, National Cyber Security Awareness Month (NCSAM) provides education, information and best practices for staying safe online to consumers, employees, parents and children.Basic tips and advice have been broken down into three key themes: Keep a...
Continue reading
1109 Hits
0 Comments

A provider’s survival guide to HIPAA threat evaluation

Within the Health Insurance Portability and Accountability Act (HIPAA) are two fundamental rules that all covered entities (like health care providers) need to understand and follow.The HIPAA Privacy Rule applies to Protected Health Information (PHI) broadly, and falling under that is the HIPAA Security Rule which focuses on electronic Protected He...
Continue reading
1079 Hits
0 Comments

How to Select a PCI Compliant Managed Service Provider

If you're in business and accepting credit card payments from customers, PCI (Payment Card Industry) compliance is something you need to manage. Whether you're swiping a card every second or just once a month, your business must comply with all of the PCI Data Security Standards (DSS). PCI compliance also applies to many of the third-party service ...
Continue reading
962 Hits
0 Comments

Cybersecurity Awareness Event to Offer Practical Tips on Identity Theft Protection for Individuals and Small Businesses

Local business owners and the general public are invited to a free Cybersecurity Awareness Event on August 17 at 6:30 PM in the Pembroke Office Park Building in Virginia Beach.Industry experts will explain – in layman's terms – why cybersecurity is more important than ever and what practical steps individuals can take to protect themselves from onl...
Continue reading
1390 Hits
0 Comments

WannaCry Ransomware Teaches Painful Lesson in Patch Management

​Irony. A state of affairs or an event that seems deliberately contrary to what one expects and is often amusing as a result.When you think about it, isn't it ironic that we spend a great deal of money on expensive bags, covers and screen protectors to protect the OUTSIDE of our computer devices when the real threat comes from the INSIDE? There's n...
Continue reading
1165 Hits
0 Comments

For HIPAA controls, how O can you go?

There's devil in the details of the various controls organizations use to ensure compliance with the requirements of the Health Insurance Portability and Accountability Act (HIPAA). We highlighted them all in a recent blog post if you want to read more. Broken out as administrative, operational or technical, HIPAA controls refer to the various proc...
Continue reading
1414 Hits
0 Comments

What providers really need to know about HIPAA Title II

The massive Health Insurance Portability and Accountability Act (HIPAA) enacted by congress in 1996 is broken out into five different titles, with Title II being the one most heavily focused on security and privacy. Title II set, for the first time, key standards for electronic health care transactions and national identifiers for providers, health...
Continue reading
1797 Hits
0 Comments

The devil in the HIPAA controls details

When it comes to meeting the requirements of the Health Insurance Portability and Accountability Act (HIPAA), there are many potential controls that health care providers can implement to protect themselves against threats that could compromise sensitive data, like patients' electronic personal health records (PHR).Getting a handle on the controls ...
Continue reading
1159 Hits
0 Comments

Springtime for hackers

​With blooming flowers, chirping birds and warming temperatures, spring finally arrived in April. But it seems the wonders of nature aren't the only thing that spring brought us. We're also getting fresh reports of hackers who are up to no good.And I'm not talking about Netflix having their shows stolen, held for ransom and released online. While t...
Continue reading
1214 Hits
0 Comments

Tag Cloud

credit card Announcement arduino IT services physical security two factor authentication support IT solutions PCI IT security computer security Shmoocon BSides Business Planning change Medical Records Payment Card Industry iphone credit cards stolen Server Mangement management David Zendzian businesses Credit Cards Linux InterWorx Assigned Names amazon ec2 Control Panel ZZ Servers dsbl cyber liability insurance PCI Solutions assesment TiaraCon IT Xen INFOSEC business solutions Ubuntu health care providers computing in the cloud safe computing embedded logical security windows 7 TLS Alarm credit card payment PCI Audit spam Credit Card Security sender policy dss vulnerability scanning members area IT Solutions HIPAA personal information anti virus employee training log files PCI DSS 3.2 business community data privacy mail server GDPR computer networks cybersecurity Geekend Compliance Home Depot Breach smartphone data breach Internet Corporation spoofing DEF CON Continuous Monitoring small business email accounts physical teensy Zendzian intrusion detection network security infrastructure spf trends Small Business openssl cyber social engineering kerio eCommerce HIDS Debian Sysadmin apache Internet infrastructure SSL cyber monitoring Hackers bash National Cyber Security Awareness Month hosting control panel Las Vegas ICANN shared secure hosting Web Hosting caller-id pci complliant hosting OSSEC cyber security Healthcare Records Domani Names Online Business shared server eCommerce Solutions QSA education search Business Solutions malicious software information technology Hosting password video Presentation Car Hacking Vulnerability exchange business cloud cyber protection ZZ Servers Co-Founder black friday Accountability Act vyatta router firewall filter security PCI HIPAA CentOs cloud infrastructure HIPAA Solutions ipad Scalable Redundant Cloud Infrastructure blackberry PCI Hosting follow.The HIPAA Privacy Rule security circles Cybersecurity Business Solutions World Backup Day passwords motivation command line phishing attacks permissions qsa compliance Internet DRP cell phone email Medical Solutions recovering data activesync PCI compliance business solitions PCI Compliance Positive Customer Impact healthcare solutions shared folders Disaster Recovery Plan PCI Data Security Standards cli HIPAA solutions cyber monday shared hosting Cybersecurity protect data Firetalk PCI Service Provider HIPPA Charleston Health Insurance Portability Security data protection phishing vps IT Services multi-factor authentication Health Care Cybersecurity lamp backup solutions Cloud Computing Windows VPS Servers Email compliant hosting Interworx-CP Reports Information Technology