Password Basics That Are Still Ignored

    You can have all the locks on your data center and have all the network security available, but nothing will keep your data safe if your employees are sloppy with passwords.   There are many ways data can … Read More

Is a Facebook Ad Good For Your Practice?

  Facebook has uses that go way beyond posting cat photos, complaining about restaurants, or stalking your ex — it’s also an incredibly effective advertising platform. From small businesses to big corporations, anyone can benefit from Facebook’s marketing tools. Read … Read More

You’re Fired! Now Give Me Your Password

    “You’re FIRED!” ( now give me your password) Losing an employee is not usually a good experience. If they leave voluntarily, you lose a valuable asset. If they have to be fired, you have the arduous task of … Read More

Hacking at it’s Finest

This week, I have the pleasure of attending Robin Robin’s Boot Camp.  I love nothing more than networking and mingling with people who do exactly what I do.  Truly, it’s therapeutic.  Robin’s Boot Camp offers every opportunity to learn how … Read More

IT Defense Part II

Defense in Depth Part II In our last blog we started talking about the different layers of security necessary to fully defend your data and business integrity. Today we will look at the human aspect of it, and network defenses. … Read More

In Depth IT Defense Part I

In the 1930s, France built a trench network called the Maginot Line to rebuff any invasion. The philosophy was simple: if you map out all the places an enemy can attack, and lay down a lot of men and fortifications … Read More

National Speaker for Medical Associations

Meet Sheryl Cherico!  A National Speaker for Medical Associations   Sheryl has spoken nationally on HIPPA compliance, Cyber Security, Digital Forensics and Information Technology Sheryl’s career began in 1979 and she is considered one of the top healthcare IT consultants in the … Read More

Data Security: A People Problem

Phishing Scams – A People Problem There are some things that only people can fix. There are many security risks to which your data is susceptible, but there is one method that remains a wonderfully effective hacking tool. That is … Read More

What is Ransomware and How Can it Affect Your Business?

This cyberattack scheme hasn’t garnered nearly as much attention as the usual “break-in-and-steal-data-to-sell-on-the-Internet version,” but it can be even more debilitating. Ransomware attacks have begun appearing in the last few years and its practitioners are so polished that in few … Read More

Data Breaches are a Question of When, Not If

You hear on the news all of the time about big cyber attacks on large corporations, and even government agencies. The trouble with this news coverage is that is suggests a distorted view of where cyber attacks are taking place. … Read More