What You Need To Know About Anthem’s Security Breach

US health insurer Anthem Inc. announced on February 4, 2015, that it was the victim of a sophisticated cyber attack resulting in the theft of tens of millions of records. Hackers were able to break into a database that contained as many as 80 million records. These records contained personal information about current and former customers, as well as staff …

APT30, A 10 Year Chinese Hacking Enterprise

A report has been released by Fireeye which details a 10 year hacking enterprise referred to as APT30, run by the Chinese.  This enterprise is staffed with shift workers who evidently must login in with an attendant code who then manage the theft of information. They seem to be focused on theft of sensitive information for espionage purposes. The targets of …

Protecting Your Personal Information Online

Identity theft and credit card fraud have reached epidemic proportions. You can scarcely go a day without reading a newspaper story about a major company losing thousands of customer records. Hackers use a variety of methods in order to compromise and steal your information. Learn about some common hacking techniques and how to protect yourself. Hacking Techniques Hacking takes patience, …

Can VoIP Save Your Company Money?

The economy might technically be out of recession, but businesses are still doing everything in their power to cut costs and save as much as possible. One possible avenue for savings is switching from a traditional business phone plan to a VoIP plan. VoIP is a technology that has been around for a little over a decade now, and allows …

5 Things to Do to Achieve 100% Infrastructure Uptime

Any company that depends on technology would want to achieve 100% infrastructure uptime for better productivity. While the idea of 100% uptime may be very appealing, it may not always be possible. However, companies can make the most of their infrastructure and get closer to their uptime targets with a little help from these tips. Moving closer to 100% infrastructure …

What You Need to Know About Creating an IT Budget for 2015

After a long period of recession, spending on business technology is now on the rise. Signs of economic recovery and a more stable operating climate have caused companies to shed their cautious approaches and spend more on IT in 2014. The Gartner research firm expects worldwide IT spending to reach $3.7 trillion in 2014, up 2.1% from 2013. Another positive …

The Push Toward Mobility: What 2014 Holiday Shopping Statistics Mean for You:

33% of Thanksgiving Day sales came from mobile devices, as did 52% of online shopping traffic Mobile devices drove over 50% of all Black Friday shopping traffic, up from 40% last year Mobile sales accounted for 28% of all Black Friday online sales, up from 22% last year 41% of Cyber Monday traffic came from mobile devices, up from 30% …

Seven security risks from consumer-grade file sync services

1. Data theft Most of the problems with CGFS solutions emanate from a lack of oversight. Business owners are not privy to when an instance is installed, and are unable to control which employee devices can or cannot sync with a corporate PC. Use of CFGS solutions can open the door to company data being synced (without approval) across personal …

What Healthcare Professionals Need to Know About Protecting Their Digital Records

For healthcare professionals, understanding the relevant legislation can be a daunting task. They must learn how to adapt to changes in the world or face stiff fines and other penalties. This is especially true in the field of digital information management. In 1996, then-US President Bill Clinton signed into law the Health Insurance Portability and Accountability (HIPAA) Act. The first …