Blog

Blog > Page 29

Blog

Endpoint security: How to protect your company

Protect your valuable data with endpoint security Modern technology presents a potential security nightmare for IT. Ransomware attacks and well-publicized cases such as the loss of a laptop with sensitive data by a US Secret Service agent have highlighted the risks involved in defending critical assets against loss or theft. With more [...]

Read More

How technology is changing the way our children learn

Digital technology is revolutionizing many parts of our lives, whether it’s communications, transport, entertainment, personal finance or even shopping. Education is no different, with advancements in digital tech transforming the way students learn in schools around the world. While Chromebooks have become commonplace in many classrooms, there are a range [...]

Read More

Securing your BYOD policy

Work practices have undergone a revolution in the digital age. Networked devices and more mobility have blurred the line between work and home as vast numbers of people perform their jobs across multiple platforms, often far from the office. An accompanying phenomenon is the bring your own device (BYOD) policy [...]

Read More

HIPAA Security Reminder of the Week

Security Reminders HIPAA 164.308(a)(4) Security Reminders Questions an Auditor may ask you (from NIST 800-66): What methods are available or already in use to make or keep employees aware of security, e.g., posters or booklets? Is security refresher training performed on a periodic basis (e.g., annually)? Is security awareness discussed with all new [...]

Read More
Call Now Button