About Josh Ablett

This author has not yet filled in any details.
So far Josh Ablett has created 41 blog entries.

SEC Cybersecurity Guidance: Wire Fraud

Wire fraud is a huge problem for Registered Investment Advisors. Every day, criminals trick firms like yours into wiring funds out of client OR firm accounts. What is the SEC Cybersecurity Guidance on wire fraud? And what are the best practices to stop wire fraud in firms today? It’s critical that your staff identify [...]

By |2019-02-15T17:50:12+00:00February 15th, 2019|Uncategorized|0 Comments

How to Make Gmail HIPAA Compliant

Google’s email, calendar, and productivity tools (recently renamed to “G Suite”) are absolutely fantastic.  They’re easy to use and very affordable. G Suite is also highly secure, but there are very specific things that you need to do to make G Suite / Gmail HIPAA-compliant.  Here are some big ones... Disclaimer: we are not lawyers. [...]

By |2019-02-15T19:28:06+00:00December 20th, 2018|Cloud Cyber Security, HIPAA|1 Comment

The 9 HIPAA Mistakes We See All the Time

As part of our work helping medical practices with HIPAA and cybersecurity, we get to see lots of HIPAA mistakes.  It’s interesting to spot the similarities across so many different companies. Here are nine of the most common HIPAA mistakes that we see. The scary part is we see them all the time. HIPAA Mistake 1: [...]

By |2019-01-04T04:11:13+00:00December 16th, 2018|HIPAA|2 Comments

HIPAA Compliant Cloud Storage – 11 Services Reviewed (Updated)

“What are my options for HIPAA compliant cloud storage? ” In recent years, cloud storage has risen in both effectiveness and popularity. Its convenience is undeniable– the ability to access your data from anywhere is amazing. But can business associates and medical providers take advantage of these services to store PHI? What exactly does [...]

By |2019-01-04T20:03:42+00:00December 6th, 2018|Cloud Cyber Security, HIPAA|4 Comments

The Best Ways to Fight Banking Trojans

Banking Trojans are back, and they're nasty. Click on the wrong email, and hackers drain your firm's operating accounts. Incredibly, many of these attacks even defeat your bank's two-factor authentication. Here's a great article that explains how banking trojans bypass two-factor authentication. So what should every business do to protect yourself against banking trojans? The [...]

By |2019-01-04T04:14:12+00:00December 5th, 2018|Computer Cyber Security, Email Cyber Security|0 Comments

Hiring a Penetration Testing Service? 14 Questions to Ask a Reference

If you're thinking of hiring a Penetration Testing service, you definitely need to do your due diligence. There's a wide range of services that penetration testing firms offer, ranging from cheap automated scans to manual expert exploit detection. As part of your due diligence process, here are 14 questions that you should consider asking the [...]

By |2019-01-04T04:12:00+00:00December 2nd, 2018|Computer Cyber Security|0 Comments

Should You Sign a HIPAA Business Associate Agreement?

Transcript: Hi there.  A a few months back, a client asked us to speak to a new vendor that they were thinking about doing business with.  The cost of doing business with our client is that they were asking this vendor to sign what's called a HIPAA Business Associate agreement.  If you're watching this video, you're probably [...]

By |2019-01-04T20:06:00+00:00December 2nd, 2018|HIPAA|0 Comments