Do you have operating controls in place to protect confidential data? Can you pinpoint where your confidential data goes inside AND outside your office?
Have a documented process to ensure continued confidentiality of your data?
If you work or even touch confidential data—including ANY personal identifiable information (PII)—EVEN Remotely—you should be taking steps to ensure your data is secure and not at risk of being exposed from a hack, leak or theft.
continue reading
I know this may sound weird, but cybercriminals do focus on customer service.
Particularly it comes to ransomware—an extortion scheme aimed at getting your money after locking down your computer files, demanding a ransom in return for a decryption key—many criminals have made getting top notch service and support a priority.
With easy payment processes—detailed instructions and all major credit cards accepted)—and simple instructions on how to use the decryption key, ransomware criminals have taken strides to make it as easy as possible for a victim to pay their ransom and get their data.
continue reading
The hidden costs are all the things that put those businesses out of business. Data breaches within the healthcare industry do not stay under wraps. You are obligated to report a breach to the Department of Health and Human Services (DHS), which becomes public knowledge. If you’re a local practice or have local presence, be assured that people will start to talk about your security breach and be certain that some will lose complete patient trust within a subset of your patients.
First, there’s a technical investigation. These are expensive. Investigations on single computers can cost well over $30,000! Because IT forensics is such a specialized field with very few players and your insurance company requires a technical investigation, you likely will be paying more for an investigation than you would ever paying to have complete security compliance.
A cloudy day in Michigan. With severe weather passing to the east and looming clouds predict the entire day, I thought it only appropriate to head over to Howell and Pick up Nicole from Armor Protective Packaging for a ride up north to Traverse City for lunch.
continue reading
With smarter firewalls and spam filters, much of the malicious traffic targeting your email box can be identified and removed from user’s inboxes (Note: your email is probably not scotch free of phishing scams. You still need to be diligent about identifying scams and skeptical to give out personal or valuable information through email).
continue reading
Did you know that you should never store your password in an Excel file or a Word document? OR A POST-IT NOTE! Did you know that you need to have a different password for all your accounts?
Do the above facts leave you looking for a better way to keep track of all the login names and passwords you use to access information on a regular basis? At Dynamic Edge, we’ve been using password databases for years, which makes our lives simpler because all the passwords we need are stored in one location.
After serious searching, we’re happy to say that we’ve found a free, open source password manager that you can use to manage your passwords in a secure way — just like us!
continue reading