Death is a morbid topic most of us try to avoid. Making a will and saying we prefer cremation is the extent of our advance planning. Yet, you may want to also think about what’s going to happen to your data.
Consider your digital footprint.
A lot of people get a handful of spam in their email inboxes every day. While spam can be a nuisance, it only takes a few minutes to delete or block spam. But if you receive tens of thousands of spam all at the same time, a huge chunk of your time and energy will be wasted on dealing with them — and they might actually be hiding telltale signs that you're being attacked by cybercriminals.
Source: HIPAA Secure Now
Was it made of gold? Encrusted in diamonds? No. Read on to learn how one laptop ended up being worth a massive one million dollars.
The U.S. Department of Health and Human Services (HHS) recently closed an investigation into Lifespan Health System Affiliated Covered Entity for a stolen laptop incident reported back in 2017. That laptop contained…ready for this? …20,431 individual patient records that all contained protected health information (PHI). And it wasn’t encrypted.
Laptop computers aren’t cheap, so you’d want to make sure you get every bit of performance for your buck. Bear in mind that they may not be set up to function at their best straight out of the box, so to do just that, you’ll need to take these steps.
Voice over Internet Protocol (VoIP) phone systems are cheaper and more efficient than regular phones, and businesses are quickly adopting it. However, transitioning without a plan can cause a range of issues that can catch business owners by surprise.
Modern technology changes rapidly, but not all businesses can match its pace. When it comes to disaster recovery (DR), we see business owners clinging to ideas that no longer apply. It’s high time you learn the truth about the following DR myths, so you can stop believing them.
The National Institute of Standards and Technology (NIST) created many of the password best practices you probably loathe — using a combination of letters, numbers, and special characters. The NIST now says those guidelines were ill-advised and has changed its stance.
Health Insurance Portability and Accountability Act (HIPAA) regulations pertaining to IT have become much clearer over the course of the past few years, but there are still a few areas in which your office might not be compliant. This isn’t necessarily because of negligence on your part, but rather a lack of understanding of the requirements.
When was the last time you checked if the firmware of your gadgets are up to date? If it has been a while, then you need to do so right away. This is because you might be using outdated firmware, and doing so makes you vulnerable to data breaches and other cyberattacks.
As communicated previously in MC198427 (Dec ’19) Office 2016 for Mac and Office 2010 will reach their end of support on October 13, 2020. After this date, Microsoft will no longer provide technical support, bug fixes, or security updates for Office 2016 for Mac and Office 2010. You will still be able to use these versions of Office, but over time, organizations may face an increase in security risks and compliance issues.