Banking Trojans are back, and they're nasty. Click on the wrong email, and hackers drain your firm's operating accounts. Incredibly, many of these attacks even defeat your bank's two-factor authentication. Here's a great article that explains how banking trojans bypass two-factor authentication. So what should every business do to protect yourself against banking trojans? The [...]
Is Gmail secure? Let's walk through the security features they have, and think about how they work in the real world. 1) Is Gmail Secure against Phishing? Hackers use "phishing" attacks to either steal your data or get control of your computer. They'll send you an email with either a link or an attachment. [...]
You can use email securely and still remain compliant with HIPAA. Here are seven tips for securely using email in a HIPAA-compliant organization.
Last week, we were sitting in a conference room with 20 people. These were smart people. All highly educated. They all use computers every single day. We were talking to them about ways to keep safe online. The conversation ranged from phishing to ransomware to staying safe at home. It was fun to be with [...]
Many practices want to use cloud storage services like Google drive and hosted email. Is Google’s G-Suite HIPAA compliant? […]
Many health care providers are required to adhere to the Health Insurance Portability and Accountability Act (HIPAA), but is Gmail HIPAA-compliant? This article talks about how you can send HIPAA compliant email. […]
Want to get started in Amazon Web Services but worried about cloud security? This step-by-step guide shows you the right way to get started in Amazon Web Services. Cloud security is a must! 1) Create your account. Go to https://aws.amazon.com/ and click on the “Sign in to the Console” button. Follow the steps to set [...]
As a HIPAA Business Associate or Covered Entity, you may rely on shredding services to make it easy to safely destroy papers and electronic media. But how do you really know what they’re doing with your paper ? […]