As most Covered Entities (CE’s) are now aware, when it comes to securing Patient Health Information (PHI) in the context of HIPAA compliance, it’s not enough to just develop a policy or procedure, put it in place and then forget it. These safeguards must be revisited, revised and re-implemented in many cases in order to […]
Please be advised that we have observed several “RansomWare” security incidents in recent weeks.
RansomWare is software that attempts to extort money from the owner of the computer, usually by doing something malicious such as encrypting important documents so that they’re unusable, and then demanding money to have them decrypted. One program named “CryptoLocker” has been […]
As long as computers have been in the mainstream, there have been viruses created to steal data or cause havoc. So, to battle the threat viruses pose to our technology, we have created antivirus software. The purpose of antivirus software has evolved over time; from just wiping a virus off of a computer to fully […]