4 Common Ways Attackers can Access a Desktop
Having access to one of your business computers is an attacker’s dream. They not only have access to the desktop’s resources, but they have full access to anything the local user has access to, which is usually corporate files and data. Desktop security is a crucial factor in IT security management. Attackers have several ways…
Read MoreWhat About the Cyber Threat Walking the Floors of Your Hospital?
Every day, there are new reports of cyberattacks around the world striking with increasing reach and devastation. Headlines like “Global ransomware attack hits Merck, health system after thrashing Europe” show the ferociousness of cybercriminals. All one has to do is read this report from Healthcare IT News to feel the chilling effect: “The virulent Petya…
Read MorePassword Security Rules: Choose Length Not Complexity
You’ve been snoozing that annoying security popup for two weeks and time has run out. Password rules are being broken too often and brazenly. Your password needs updating. Even as an administrator you find this annoying. Imagine how the rest of your organization feels—and they probably don’t care about security as much as you do.…
Read More6 Habits You Need to Break Now If You Want To Avoid a Patient Data Breach
Habits can be hard to break; we get it. Especially when they’re habits we’ve developed at work. We can’t blame clinicians for these bad habits though. They’re just taking on actions that they’re seeing. Some poor habits can develop over time, especially with the demands that come with patient-care and constantly changing healthcare regulations. These…
Read More5 Ways Technology Puts Your Health at Risk & 5 Hacks to Safeguard
Overuse of digital technology can overshadow otherwise good health care. Here are 5 common health destroyers, with 5 simple prevention measures. In the early 60s, a space-aged cartoon entitled The Jetsons pulled kids to television sets on Saturday mornings. Back then the futurist gadgets the family used seemed impossible. Today many of them exist, and…
Read MoreHow Safe is your Clinic’s Data?
Is Your Clinic’s Data Safe? Clinics can be busy, challenging places to work. With the demands of patients and the needs of staff at the forefront of operator minds, it’s no surprise that concerns like data safety can fall by the wayside. How easy it is to forget that data is the foundation of any…
Read MoreTurn Your Smartphone Into Your Computer Key
You’re working away at your city’s coolest new co-working space, and the energy in the building is buzzing—or maybe that’s just you from all the coffee you’ve had this morning. So much coffee, in fact, you need to run to the restroom. What if you had a computer key, just like your car key? Why…
Read MoreWhy Traditional Passwords Are a Time Waster
Dealing with passwords is as much a part of the modern world as the internet or technology in general. Over the years, they’ve gone from something we have only a few of to something that we’re surrounded by. Traditional passwords are out of control. Most people lose track of how many online accounts and passwords…
Read More- « Previous
- 1
- …
- 17
- 18
- 19