The bad-guys are getting smarter, taking advantage of tactics used by criminals for centuries.  Ransom and extortion have long been used due to the way they invoke very personal feelings of dread and loss.  We all know it’s bad to give money to bad people who’ve done bad things, but nonetheless it’s a very effective […]

Many business owners don’t understand the ramifications associated with using simple backup methods like USB/pen drives, synchronization to another folder location, backups to a network share, cloud-sync, etc.  What’s wrong with these methods?  You might think you’re simply protecting against a hard drive or server failure, but viruses are becoming a much bigger threat. Today’s […]

Last week, security blogger Marc Rogers posted an article describing how Lenovo admittedly installed adware on consumer laptops which compromised users’ security. Lenovo’s response was feeble and insulting, hinting at the sort of hubris that only a corrupt politician could expect his or her constituents to endure without question.  Although still insufficient, an apology would be nice (or at least […]

By allowing profits to come before the safety of consumers, Lenovo violated our trust and made a huge withdrawal from our emotional bank accounts.  Indeed, all extraneous software will now be considered suspect.  Here is how Lenovo and it’s CTO Peter Hortensius can recover and come out smelling like roses. Forge and enact a new […]

When looking for a small business cloud hosting company in the NJ/NYC area, security and compliance questions are sure to arise.  Any understandably so.  We put together a list of frequently asked questions here to guide our prospective customers accordingly.  The questions and answers refer specifically to our New Jersey data center cloud hosting operations. […]

This morning, we sent out a notice to our customers regarding an email that purports to be from UPS.  It looks like a legitimate delivery notice.  It has an attachment as well.  The sender’s goal is to have you click on the link(s) or attachment in order to effectuate the attack. We don’t have specifics […]

HIPAA and the HITECH Act are U.S. federal laws that apply to most physicians’ offices and healthcare facilities.  They set forth the requirements for the safeguarding of identifiable health information, also called Protected Health Information or PHI. HIPAA and the HITECH Act also require these entities to sign agreements (called business associate agreements BAAs) with […]

You may have seen a lot of encryption news lately, and you aren’t alone. According to Hoffman & Hoffman Worldwide the level of interest in encryption and the number of encryption-related news articles are at an all-time high. What’s causing all the attention? A few things: Increased Breaches As more breaches occur and news outlets […]

As more and more employees are using their own mobile, electronic devices for work, employers must recognize and address the many issues that arise from this practice. Today employees typically own three separate electronic devices (smart phones, tablets and laptops), which all potentially can be used for work. In the very near future, e-mails and […]

Being proactive and not reactive when it comes to protection of business networks and PHI has not been on the forefront in medical offices.  Healthcare professionals are bordering being paralyzed with the overwhelming amount of changes in their organizations that drive resource and financial obligations.  This is the key to why it is being put […]