View Post

Healthcare Ransomware Attacks to Double by 2018 [Report]

In Security by Shelly KramerLeave a Comment

There can be little doubt that recent technological advances have enormous potential to benefit both patients and practitioners across the healthcare sector. As administrators and engineers strive to capture the benefits sensor technology and big data analysis can offer however, EHR systems are increasingly coming under threat from cyber security breaches, and, in particular, from increasingly sophisticated ransomware attacks. That …

View Post

How Signing Emails Can Help Keep Your Company Secure

In Security by Shelly KramerLeave a Comment

On average, business users send and receive 42 emails per day via a number of devices, including smartphones, tablets, and desktop computers. All that online activity is inviting to hackers, which is why phishing and malware attacks are common in office email breaches. Are the email accounts in your office protected? We’ve discussed cyber security in the past, including strategies …

View Post

Predictive Analytics and the Future of Cybersecurity

In Security by Daniel Newman1 Comment

Today, cyberspace operates like a warzone. Attacks are intelligent and measured, the enemy is at your backdoor, and your best guys, your IT team, are on the front lines. If you planned on being Switzerland – neutral and unassuming – it’s time to face reality. Cyberattacks happen to the best of us, with no warning and no way to retaliate …

View Post

Creating Mobile Computing Experiences

In Mobility, Security by Daniel NewmanLeave a Comment

The advent of smartphones created the desire for full functionality that fits in the palm of your hand. Apps have become a mainstay of mobile technology, offering specialized functionality in an incredibly vast spectrum of customer desires and interests. Now, mobile technology is a lynchpin of modern business. Users don’t simply want a smartphone—they’re looking for mobile computing experiences. Experience …

View Post

Security Heightens as Hackers Target Mobile

In Mobility, Security by Daniel NewmanLeave a Comment

Many enterprises have taken to creating their own proprietary apps and software, and mobile devices are now a mainstay in modern business. Shadow IT isn’t the only concern accompanying the growth of mobile in the business world, however. As mobile technology becomes more popular and pervasive, hackers are turning their attention toward mobile devices. Understand Shadow IT in Modern Business …

View Post

The Hard Line Between Disaster Recovery Planning and Experience

In Security by Daniel NewmanLeave a Comment

Balancing proactive and reactive business approaches is tricky. If you wait too long to address a risk, your business could suffer a major blow, but investing in a what-if scenario costs time and money that may not be the best investment—unless you consider peace-of-mind about your company’s future a sound financial investment. Too many times, companies who fail to invest …

View Post

Security Is a Must, But Is It Costing Productivity?

In Security by Daniel NewmanLeave a Comment

In past posts, I’ve discussed how important it is for companies to focus on their IT security strategy. When strategy becomes too rigid, however, employees pay the price. Accessibility issues create extra work for the help desk, slowing a company’s productivity. How do you balance security and productivity? The two don’t have to work against each other. You can protect …

View Post

Sharing: The #1 Reason Your Company Security Will Be Breached

In Security by Shelly KramerLeave a Comment

Many companies are headed to the cloud these days looking for new and better ways to collaborate, store, and share information. Is yours? Whether you’re going the public, private, or hybrid route, moving to the cloud is a very popular decision—in fact, you’ll find 93 percent of companies share your strategy. Of course you didn’t adopt cloud because you wanted …

View Post

Cybersecurity Risks and the Healthcare System [Report]

In Security by Shelly KramerLeave a Comment

When you think about online security, it’s a fair bet that the protection of your health records will be near the top of the list of the personal data that you value the most. Well, surprise: According to a new benchmark report, your personal health information would appear to be less well protected than you might imagine. The Insights Industry …