Cybersecurity

Cybersecurity Tips to Avoid Tricks to ePHI

Trick-or-treating is a popular Halloween tradition in the United States, and other countries. Most of us associate “treats” with some …

Cybersecurity Tips to Avoid Tricks to ePHI Read More »

Did You Remember to log off Your Work Computer?

Occasionally we are asked if users should logoff their computer if an automatic logoff procedure is already in place. For …

Did You Remember to log off Your Work Computer? Read More »

Ransomware Attack Impacts and Allscripts Applications

On January 18, 2018 Allscripts experienced a ransomware attack that impacted their cloud based EHR and other services. At this …

Ransomware Attack Impacts and Allscripts Applications Read More »

Cybersecurity Tips to Avoid Tricks to ePHI

Trick-or-treating is a popular Halloween tradition in the United States, and other countries. Most of us associate “treats” with some …

Cybersecurity Tips to Avoid Tricks to ePHI Read More »

Beware of Scammers Lurking in Social Media Platforms

Hurricane Harvey has hit Texas and Louisiana in ways we have never seen. According to the HHS Office for Civil …

Beware of Scammers Lurking in Social Media Platforms Read More »

Take a Walk on the Cloud Side of Computing Solutions

In our article last week we discussed when a cloud-based phone provider is considered a business associate. For many healthcare …

Take a Walk on the Cloud Side of Computing Solutions Read More »

When is Your Cloud-based Phone Provider a Business Associate?

Several years ago, Plain Old Telephone Service (POTS) was the most common option for communications over a telephone network. Now, …

When is Your Cloud-based Phone Provider a Business Associate? Read More »

Cybersecurity Requires Immediate and Aggressive Attention

Not too long ago, “WannaCry,” a ransomware attack significantly impacted organizations around the globe last month. Another attack – “Petya” …

Cybersecurity Requires Immediate and Aggressive Attention Read More »

Scroll to Top