5 Tips for Safe Remote Working

More and more people are starting to work from home, not just because of Covid-19, but on a regular basis.  With working from home, or other remote locations comes a great responsibility.  The ability to stay safe while online.  If … Read More

More Breaches

Each week, there are more and more breaches.  I just thought I would share with you something we get from one of our vendors, ID Agent.  They work with us for dark web scanning and keep us up to date … Read More

Safeguarding Your Practice Better Than Equifax Did!

I want to help you with safeguarding your practice better than Equifax did.  You can’t deny that today we are living in an era of unprecedented technological progress. Particularly in the medical world, we find ourselves more empowered day by … Read More

IT Security Mistakes

4 Deadly IT Security Mistakes For something so instrumental to the success of your practice, technology can be an incredibly unstable, confusing and ever-changing tool. Just when you think you’ve got a handle on the latest cyber security trend, hackers find … Read More

Ransomware Attack on HHS

I heard to day that there has been a ransomware attack on HHS.  Seriously?  Unbelievable.  This goes far beyond money and is purposely trying to hurt millions of people.  Ruthless, cowardly and downright mean.  Thankfully HHS was ahead of the … Read More

Why Digital Forensics?

Why digital forensics?  When I tell people I am a Certified Digital Forensic Examiner the first thing they ask me is…”what is that”?  It’s very simple.  It is investigating computers and mobile devices to find various types of evidence.  Your … Read More

VOIP Phishing

You may have noticed more and more VOIP Phishing has been flooding cell phones all over the world. Thanks to Voice over Internet Protocol (VoIP) technology, business communication has vastly improved and is now more cost-efficient. Using a variety of … Read More

Heading into 2020

As we are heading into 2020, I would like to take a few moments to reflect on the success and failures of Tier3MD.  This year, we will be celebrating our 15th anniversary.  Pretty good since the changes in technology affect … Read More

Insider Threat Management

A lot of practices are learning how to manage hackers or malware, but no many have a plan for insider threat management. This means there is no plan for attacks that come from within the company walls. Whether malicious or … Read More

Unique User ID

I am asked this question on a daily basis.  Do we need each staff member to have a unique user ID?  Is a unique user ID required?  The answer is YES.  Almost every network I look at has user ID’s … Read More