Filter Categories
All
Breach News
C Suite
Compliance
FTC Actions
General News
HIPAA News - Fines
Tech Trends
Vulnerability News
-
Every business, regardless of its size, aspires to grow. To make this happen, business owners work tirelessly tobuild the right...
-
Cyber insurance is an invaluable tool in your risk management arsenal. Think of it as one of the many weaponsyou...
-
Imagine being the owner of the most popular coffee joint on the corner. Your loyal customers line upoutside each morning,...
-
You might be thinking that you’ve done everything to protect your business from cyberthreats. You have themost advanced security solutions...
-
Are you feeling like you’re falling behind in today’s digital race? You’re not alone. The cutthroat business world no longer tolerates...
-
Whether you’re a small business or a multinational corporation, your success hinges on the integrity andavailability of critical data. Every...
-
Imagine starting your day with a cup of coffee, ready to tackle your to-do list, when an email that appears...
-
AI has become a buzzword that often evokes a mix of awe, doubt and even fear, especially when it comes...
-
Managing a business on your own is challenging enough without worrying about cyberattacks. However, thereis cause for alarm as hackers...
-
Hackensack Meridian Health and West Caldwell Care Center (WCCC) have been issued a final civil money penalty (CMP) of $100,000...
-
Are you prepared to face a cybersecurity breach, a natural disaster or a system failure? Such disruptive events can strike at...
-
Worried about cyberattacks hitting your business? You’re not alone. Cyberattacks pose a real danger to businesses like yours and without a...
-
How secure is your IoT (Internet of Things) data? If you don’t know the answer, you could be in trouble. Yes,...
-
In the world of business, your data holds the key to understanding customers, market trends and internal operations. Making the...
-
In today’s business landscape, data isn’t just power — it’s the very lifeline that fuels business decisions, drives innovations and...
-
A federal court had temporarily shut down Automators AI E-Commerce Money-Making Scheme, a deceptive business opportunity that conned consumers into...
-
Businesses today face a range of cybersecurity threats, from social engineering attacks like phishing to sophisticated ransomware. For business leaders...
-
Your network is your business’s lifeline. A healthy and secure network is critical for seamless communication and operational efficiency. That’s why...
-
Is your business prepared to confront today’s growing cybersecurity threats? Although adopting the latest technologies and industry trends is undoubtedly crucial,...
-
New York Attorney General Letitia James has reached an agreement with Refuah Health Center, Inc. to address the health care...
-
In the current digital environment, where cyberthreats are commonplace, it makes perfect sense to have cyber liability insurance. However, just...
-
The Federal Trade Commission (FTC) has proposed changes to the Children’s Online Privacy Protection Rule (COPPA Rule) to strengthen children’s...
-
Rite Aid has been banned by the Federal Trade Commission (FTC) from using facial recognition technology for surveillance purposes for...
-
The Federal Trade Commission (FTC) has taken action against Global Tel*Link Corp. and its subsidiaries for failing to adequately secure...
-
Yakima Valley Memorial Hospital has settled with the U.S. Department of Health and Human Services’ Office for Civil Rights (OCR)...
-
The Federal Trade Commission (FTC) has reached a settlement with genetic testing firm 1Health.io over charges of failing to protect...
-
St. Joseph’s Medical Center has settled with the Office for Civil Rights (OCR) over a HIPAA investigation regarding the disclosure...
-
In today’s rapidly evolving digital landscape, where cyber threats and vulnerabilities continually emerge, it’s obvious that eliminating all risk is...
-
Keeping sensitive data and critical tech safe from cyberattacks is crucial for businesses like yours. Your survival and growth depend...
-
The Federal Trade Commission (FTC) has announced the Voice Cloning Challenge to prevent the misuse of AI-enabled voice cloning technology...
-
When creating a budget for your business, it’s important to remember that technology costs are more than just operational expenses....
-
Digital transformation is necessary for all businesses that want to thrive in today’s competitive market. It helps businesses like yours...
-
The U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR) has settled a ransomware cyber-attack investigation...
-
The Federal Trade Commission (FTC) has amended the Safeguards Rule to require non-banking financial institutions to report data security breaches....
-
Phishing scams remain one of the most prevalent and successful types of cyberattacks today, so being aware of the danger...
-
Social media has significantly transformed the way we communicate and do business. However, this growing popularity also comes with potential...
-
Compliance and security are equally crucial for the seamless operation of your business. Although security is a prime component of...
-
The rise of AI has sparked a revolution. Everyone, from industry giants to smaller enterprises, is captivated and eager to...
-
A disaster preparedness plan helps businesses withstand any calamity. However, many businesses are unaware that a cybersecurity strategy is also...
-
Your business, in all likelihood, already faces numerous challenges in today’s tech-driven world. However, the aftermath of an unexpected disaster...
-
UnitedHealthcare Insurance Company (UHIC) has reached a settlement with the Office for Civil Rights (OCR) at the U.S. Department of...
-
We live in an era where organizations are increasingly aware of the ever-changing cybersecurity landscape. Despite billions of dollars invested...
-
In today’s rapidly evolving threat landscape, employee cybersecurity training is crucial. It acts as the frontline defense against cyberattacks, empowering...
-
Cyberattacks have become rampant and have also grown in sophistication. A simple lapse in your network security could lead to...
-
In today’s digital age, most businesses rely heavily on technology to streamline their operations and stay ahead of the competition....
-
The HHS Office for Civil Rights has settled a HIPAA investigation with iHealth Solutions for $75,000. iHealth Solutions, a business...
-
The Cybersecurity Maturity Model Certification (CMMC) was formally made part of the Defense Federal Acquisition Regulation Supplement (DFARS) in January...
-
The Federal Trade Commission (FTC) has charged genetic testing company 1Health.io (formerly known as Vitagene) with multiple violations related to...
-
Anyone offering a sure-shot solution to all your Cybersecurity Maturity Model Certification (CMMC) woes is trying to pull a fast...
-
Artificial intelligence (AI) can help organizations like yours gain an edge in today’s highly competitive business landscape by increasing efficiency,...
-
In an all too familiar scenario, the U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR),...
-
While artificial intelligence (AI) has many benefits for businesses, it has also created new vulnerabilities that cybercriminals can exploit to...
-
In today’s fast-paced and digitally driven world, the demands placed on the IT infrastructure of businesses like yours are ever-increasing....
-
In today’s threat landscape, businesses are constantly at risk of being targeted by a cyberattack. Adopting a zero trust security...
-
In today’s digital age, ransomware attacks are becoming increasingly frequent, sophisticated and costly. With cybercriminals constantly evolving their tactics and...
-
Ransomware is a type of malicious software that encrypts files on a device or network, making them unusable until the...
-
When it comes to protecting your business from cyberthreats, having the right tools and technology is only half the battle....
-
The Federal Trade Commission (FTC) has finalized an order requiring Epic Games, the maker of Fortnite, to pay $245 million...
-
When it comes to managing your business’s IT infrastructure, there are several options available. One is fully managed IT, where...
-
Cybersecurity is an essential aspect of any business or organization. As technology evolves, so do the threats that can harm...
-
Cybercriminals are always looking for new ways to bypass security defenses. That’s why it’s essential to think like a hacker...
-
As a business owner, you may feel that you need to choose between relying on your in-house IT staff or...
-
The Federal Trade Commission (FTC) has finalized its order with education technology provider Chegg Inc. for its lax data security...
-
There are many benefits digital transformation has brought to businesses like yours, such as easier inventory management and order processing....
-
Supply chain attacks are a primary concern for businesses nowadays. With technology becoming increasingly advanced, businesses like yours must ensure...
-
As a business owner, it’s crucial to prioritize the security of your supply chain and choose vendors that are committed...
-
What exactly is a supply chain attack and how does it impact your organization? A supply chain attack is a...
-
Your software is only as good as its last patch. Reaching End of Life (EoL) or End of Service (EoS)...
-
When a software or hardware product reaches its End of Life (EoL) or End of Service (EoS), it’s no longer...
-
It’s crucial to keep all software and hardware up to date to maintain optimal security. If you don’t, cybercriminals can...
-
We are all aware of the term “use by date.” It is regularly used when talking about food and medications...
-
Are you considering all the necessary technology categories when planning your annual budget? Technology is essential for any modern business such...
-
Data loss is a genuine threat to all businesses. Not only can it cost a lot of time, money and...
-
Businesses like yours are increasingly adopting cloud-based solutions to keep up with the rapidly changing technological landscape. According to a...
-
Your data is essential for your business’s success. There’s no doubt about it in the modern digitized era. However, not...
-
When you entrust your business data to a cloud-based platform, you expect it to be safe and sound. However, most...
-
Backups play a critical role in any data protection strategy. However, if you are entirely dependent on your backups for...
-
As a business owner, you’re probably already aware of the threats looming over data security in today’s digital environment. The...
-
When a software or hardware product reaches its End of Life (EoL) or End of Service (EoS), it’s no longer...
-
Are you considering all the necessary technology categories when planning your annual budget? Technology is essential for any modern business such...
-
Are you planning to include your IT needs in your annual budget this year? If so, congratulations! You’re doing something...
-
With the new year around the corner, now is an excellent time to review your organization’s budget to ensure your...
-
Do you find budgeting for IT challenging? If so, you aren’t alone. While the IT budgeting process can be tricky for...
-
From a data regulator’s perspective, it is the responsibility of your business to keep data safe from cyberthreats, inform clients...
-
Remote or hybrid work models are utilized by many businesses to keep their operations up and running. For all its...
-
The COVID-19 pandemic has changed everything about the world as we know it. Just as we started embracing new practices...
-
Over the last few years, we have seen several tech companies, such as Buffer, Todoist and Help Scout, to name...
-
A cyber incident is a type of security event that can harm a business like yours. Ranging from data breaches...
-
Your company operates in a turbulent business environment where new technologies are reshaping industries, customer preferences are evolving rapidly and...
-
With the business world heavily reliant on digitalization in this day and age, the use of technology in your organization...
-
Rapid technological advancement and rising global connectivity are reshaping the way the world is functioning. From higher productivity to improved...
-
In 2021, organizations that didn’t have zero trust incurred an average breach cost of USD 1.76 million more than those...
-
Imagine it’s the end of a long workday and you’re ready to head home for the evening. However, just as...
-
As a small business owner, you may think you are “too small” to be the target of cybercrime because you...
-
As the world increasingly moves online, so do the risks to our businesses. Cyber insurance is one way to help...
-
When looking for cyber insurance for your small business, you may find it hard to navigate technology and insurance jargon....
-
As the world becomes more digitized and cybercrime increases, the need for cyber insurance is something businesses should not overlook....
-
With most companies embracing remote or hybrid workforce models in the wake of the pandemic, cybersecurity threats have grown rapidly...
-
The Federal Trade Commission (FTC) and the Department of Justice (DOJ) have charged Amazon with violating children’s privacy laws by...
-
Once you’ve completed a technology audit and prioritized the order in which you’ll close gaps in your infrastructure, it’s critical...
-
Most small and medium-sized businesses (SMBs) are stretched for time and resources, due to which they may end up rushing...
-
From the CISA web site: “Google has released Chrome version 99.0.4844.51 for Windows, Mac, and Linux. This version addresses vulnerabilities...
-
Your company operates in a turbulent business environment where new technologies are reshaping industries, customer preferences are evolving rapidly and...
-
From the HHS web site: “Dr. U. Phillip Igbinadolor, D.M.D. & Associates, P.A. (UPI), a dental practice with offices in...
-
From the HHS site: “Dr. Donald Brockley, D.D.M., a solo dental practitioner in Butler, Pennsylvania, failed to provide a patient...
-
From the HHS website “Northcutt Dental-Fairhope, LLC (Northcutt Dental), a dental practice in Fairhope, Alabama, who impermissibly disclosed its patients’...
-
From the HHS website “Jacob and Associates, a psychiatric medical services provider with two office locations in California, agreed to...
-
Organizations have had to make several overnight adjustments to stay afloat over the last few years. If you’re like most...
-
It can be exciting to introduce new technology into your business. Finding a solution that will help your team members...
-
Technology is advancing at an unprecedented pace, empowering businesses to accomplish more in less time. The transformations that technology has...
-
The technological landscape has advanced dramatically over the last couple of decades and continues to move faster than anyone could...
-
Technology is an unavoidable component of most businesses these days, helping them achieve their goals and vision. However, if you...
-
Over the last few decades, technology has been a driving force in business transformation and doesn’t show any signs of...
-
Today’s technology-based businesses must deal with multiple issues, including cyberthreats, head-to-head competition, and regulatory compliance. Hence, keeping your technology infrastructure...
-
Right off the bat, we’re here to tell you that anyone promising you a sure-shot solution to all your CMMC...
-
The Cybersecurity Maturity Model Certification (CMMC) was formally made part of the Defense Federal Acquisition Regulation Supplement (DFARS) in January...
-
After the ups and downs of the last year and a half, the business world is making its way into...
-
Phishing is a social engineering attack used to obtain sensitive information, such as login credentials and payment details, from users....
-
When used strategically, technology can help small and medium-sized businesses (SMBs) develop a more productive, efficient and innovative workforce. That’s...
-
When was the last time you conducted a comprehensive technology audit? If it’s been a while or hasn’t happened at...
-
From the HHS site “Wake Health Medical Group, a provider of primary care and other health care services in Raleigh,...
-
From the HHS site “Dr. Robert Glaser, a cardiovascular disease and internal medicine doctor in New Hyde Park, NY, did...
-
From the HHS site “Rainrock Treatment Center, LLC dba Monte Nido Rainrock (“Monte Nido”), a licensed provider of residential eating...
-
November 30, 2021HIPAA Enforcement Action: Denver Retina Center Resolution Agreement and Correction...From the HHS site “Denver Retina Center, a provider of ophthalmological services in Denver, CO, has agreed to take corrective...
-
From the HHS site “Advanced Spine & Pain Management (ASPM), which provides management and treatment of chronic pain services in...
-
The major upheavals of the last couple of decades, such as the global recession and the COVID-19 pandemic, have demonstrated...
-
A security incident can topple an organization’s reputation and revenue in a short amount of time. As billionaire Warren Buffet...
-
From the HHS site “The Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services announces...
-
A compliance program aims at protecting an organization from risk. The purpose of corporate compliance programs is to ensure that...
-
As the name signifies, a BIA quantifies the impact of a cyber disruption on your business. It doesn’t matter if...
-
Being a business owner is challenging. You have to deal with multiple problems at once and effectively solve each of...
-
The COVID-19 pandemic has impacted everyone in one way or another. If there is one category that most benefited from...
-
If you want your business to remain competitive even during a business disruption, you need to self-reflect. What’s your plan against...
-
Software-as-a-Service (SaaS) applications are more in use than ever before. Almost every company uses either one or the other SaaS application...
-
From the HHS site “The Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services has...
-
From the HHS site “Peachstate Health Management, LLC, doing business as AEON Clinical Laboratories (Peachstate), has agreed to pay $25,000...
-
From the HHS site “The Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services announces...
-
Digital transformation has made many things easier for businesses, right from inventory management and order processing to managing financials. On...
-
Your business’ cybersecurity posture must prioritize detection, evaluation and mitigation of risks posed by your supply chain. It is vital...
-
Merely mitigating external cybersecurity threats isn’t enough when it comes to fighting cybercrime in today’s ever-evolving threat landscape. Although insider...
Special Ops Generals and war fighters on a war footing at all times
We understand the risks from IT designs, workflows and technology
We can conduct a risk assessment and implement controls: ISO, HIPAA, CMMC, PCI-DSS, CIS, NIST-CSF etc.
We will work with you to discover and neutralize threats at the earliest stages before they spread
We are Veterans at Technology Implementations