IT Defense Part II

Defense in Depth Part II In our last blog we started talking about the different layers of security necessary to fully defend your data and business integrity. Today we will look at the human aspect of it, and network defenses. … Read More

In Depth IT Defense Part I

In the 1930s, France built a trench network called the Maginot Line to rebuff any invasion. The philosophy was simple: if you map out all the places an enemy can attack, and lay down a lot of men and fortifications … Read More

National Speaker for Medical Associations

Meet Sheryl Cherico!  A National Speaker for Medical Associations   Sheryl has spoken nationally on HIPPA compliance, Cyber Security, Digital Forensics and Information Technology Sheryl’s career began in 1979 and she is considered one of the top healthcare IT consultants in the … Read More

Data Security: A People Problem

Phishing Scams – A People Problem There are some things that only people can fix. There are many security risks to which your data is susceptible, but there is one method that remains a wonderfully effective hacking tool. That is … Read More

What is Ransomware and How Can it Affect Your Business?

This cyberattack scheme hasn’t garnered nearly as much attention as the usual “break-in-and-steal-data-to-sell-on-the-Internet version,” but it can be even more debilitating. Ransomware attacks have begun appearing in the last few years and its practitioners are so polished that in few … Read More

Data Breaches are a Question of When, Not If

You hear on the news all of the time about big cyber attacks on large corporations, and even government agencies. The trouble with this news coverage is that is suggests a distorted view of where cyber attacks are taking place. … Read More

Virtualization Explained!

  What exactly is virtualization?  I have received this question numerous times.  There seems to be some confusion between the cloud, and virtualization.  They are both similar, but each have their own very different benefits.  I tried to sum it … Read More

Penetration Testing vs. Vulnerability Testing Your Business Network

Hearing “all of your confidential information is extremely vulnerable, we know this because…” is bad news, but whatever follows the ellipses determines just how bad. Consider two scenarios. “All of your confidential information is extremely vulnerable… we know this because … Read More