Bring Your Own Devices

If you currently allow, or are considering allowing, employees to use their own mobile devices for work purposes, there are some steps that need to be taken to ensure that you’re not at risk for expensive security breaches. By taking the following steps you will allow your employees to stay productive while mitigating risk and ensuring that you have plans and procedures in place in case something should happen: Create a coherent policy before...

Read More

Are you losing control?

The biggest cybersecurity threat facing healthcare organizations is a startling lack of proper security controls. Currently the areas of greatest vulnerability are medical devices, VPN applications, and other access points. Medical devices have been receiving increased attention from hackers and can pose a significant threat to hospitals and their patients PHI. The greatest risk that VPN technologies present is that once credentials are...

Read More

Phishing Is Not Going Away

Phishing is one of the oldest scams in the hacker playbook. Sending fraudulent emails in an effort to obtain usernames, passwords and other sensitive information can be an extremely effective scam. It’s also one of the easiest to prevent through training and awareness. Recently ITPAC ran a phishing test for a local bank. 67.5% of the bank employees tested failed the test. 52.5% of bank employees gave up their username/password. 15% of the...

Read More