HHS OCR Reaches Agreement with NJ Health Care Provider That Disclosed Patient Information in Response to Negative Online Reviews

In an all too familiar scenario, the U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR), has reached a settlement with Manasa Health Center, a psychiatry practice in New Jersey. The settlement resolves a complaint that the health care provider disclosed a patient’s protected health information in response to a negative …

How to Stay Ahead of AI-Powered Cybersecurity Risks

While artificial intelligence (AI) has many benefits for businesses, it has also created new vulnerabilities that cybercriminals can exploit to carry out complex cyberattacks that are difficult to detect and mitigate. Using AI, hackers can create convincing phishing emails that bypass spam filters. Similarly, cybercriminals can leverage AI to manipulate security systems and gain unauthorized …

Don’t Let These Outsourced IT Myths Limit Your Success

In today’s fast-paced and digitally driven world, the demands placed on the IT infrastructure of businesses like yours are ever-increasing. To meet these challenges head-on, embracing outsourced IT services and entrusting your technological needs to an expert third-party provider is the best option. By partnering with these specialists, you can tap into a wealth of …

Don’t Trust These Zero Trust Security Myths

In today’s threat landscape, businesses are constantly at risk of being targeted by a cyberattack. Adopting a zero trust security model could be a wise decision from a cybersecurity point of view.  Zero trust works on the premise that everything — humans, machines or applications — poses a risk to your network and must prove …

It’s Time to Bust These 3 Ransomware Myths

In today’s digital age, ransomware attacks are becoming increasingly frequent, sophisticated and costly. With cybercriminals constantly evolving their tactics and targeting businesses of all sizes, organizations like yours must proactively safeguard your data and systems. Unfortunately, many companies fall prey to common ransomware myths, which can leave them vulnerable to attacks and unprepared to respond …

The Best Defense Against Ransomware

Ransomware is a type of malicious software that encrypts files on a device or network, making them unusable until the victim pays the attacker a ransom. What started as a simple virus spread through floppy discs in the late 1980s has now evolved into a billion-dollar cybercrime industry. Even with new security measures in place, …

Top 9 Benefits of Outsourcing Your Cybersecurity

When it comes to protecting your business from cyberthreats, having the right tools and technology is only half the battle. You also need the expertise, controls and processes to manage and mitigate these threats effectively. That’s where a managed security service provider (MSSP) comes in. Think of an MSSP as your outsourced cybersecurity department, ensuring …

Fortnite maker Epic Games to Pay $245 Million

The Federal Trade Commission (FTC) has finalized an order requiring Epic Games, the maker of Fortnite, to pay $245 million to consumers. The FTC accused Epic of using dark patterns to trick players into making unwanted purchases and allowing children to make unauthorized charges without parental consent. The complaint stated that Fortnite’s confusing button configuration …

Does Your Business Need Co-Managed IT?

When it comes to managing your business’s IT infrastructure, there are several options available. One is fully managed IT, where an IT service provider takes care of all aspects of your IT needs, from monitoring and maintenance to troubleshooting and problem resolution. Another option is co-managed IT. Co-managed IT provides supplemental support to your internal …

Stepping Up Your Cybersecurity with Defense in Depth (DiD)

Cybersecurity is an essential aspect of any business or organization. As technology evolves, so do the threats that can harm an organization’s operations, data, and reputation. One of the most effective ways to defend against these threats is through the Defense in Depth (DiD) approach. DiD is a cybersecurity approach in which multiple defensive methods …