Latest Articles

Managing shadow IT

“Shadow IT”, or solutions not specified or deployed by the IT department, now account for 35 percent of enterprise applications. Research shows an increase in IT shadow spend with numbers projected to grow another 20 percent by the end of 2015. So how do you start to get a handle on it? … Read More
Share this post:

The web’s greediest villain: ransomware

October is National Cyber Security Awareness Month (NSCAM) and it's meant to engage, educate and raise awareness of the importance of cybersecurity to our nation. We are celebrating with a series of blog posts, giveaways and juicy content all about protecting users and networks from the growing threats that haunt our digital lives. This post covers one of the darkest, greediest threats out there: ransomware. … Read More
Share this post:

The PHI security double whammy and what to do about it

Two healthcare security trends are colliding that should have healthcare executives taking action. One is an increasing number of personal health information (PHI) disclosure points. The other is a shift from employee negligence to criminal attacks as the leading cause of PHI breaches. With more access points and more criminals bent on penetrating them, the potential for HIPAA violations and resulting fines is skyrocketing. … Read More
Share this post: