Managing Data at Every Stage of Its Lifecycle

Call Us Today 814-684-5505

Managing Data at Every Stage of Its Lifecycle

Call Us Today 814-684-5505

Posts by Reclamere Team

CEO Fraud through Business Email Compromise

Reclamere believes that protecting your business, customers, and employees by teaching them the best practices in cybersecurity makes good business sense. That’s why Reclamere has partnered with Wuvavi to deliver employee information security and awareness training to our employees and clients. Wuvavi delivers cyber training in a funny, informative, and effective way. The video that…

Read More

Case Study: Penn Highlands Healthcare

Customer: Penn Highlands Healthcare Website: www.phhealthcare.org Customer Size: 3,431 Employees Location: 4 hospitals in Penn Highlands Brookville, Penn Highlands Clearfield, Penn Highlands DuBois, and Penn Highlands Elk Industry: Healthcare Customer Profile: Penn Highlands Healthcare provides residents with access to the region’s best hospitals, physicians, a nursing home, home care agency and other affiliates who believe…

Read More

Important Questions to Ask a Data Destruction Provider

Many corporate data breaches result from negligent data disposal practices. The only way to prevent your company’s proprietary information, customer or patient data, and employee information from falling into the wrong hands, is to have a secure and comprehensive data destruction process in place. In this blog, we offer several important questions to ask a…

Read More

Data Security Tips for National Cybersecurity Month

Cubed background in different sizes and blue colors aligning to a row of glowing information security icons surrounding the word cybersecurity 3D illustration

October is National Cybersecurity Month, an annual initiative for fostering cybersecurity awareness among consumers, businesses, and communities. In that spirit, here are several tips for keeping your data and devices safe: Tip 1: Be Proactive A proactive cybersecurity approach is one of the most effective ways to prevent data breaches. Since vulnerabilities are often overlooked…

Read More

Who’s Responsible for Managing Your Company’s Cybersecurity?

Today’s news is full of reports about cybersecurity breaches. Large, corporate data breaches get the big headlines, but this doesn’t mean small businesses aren’t at risk. Hackers don’t discriminate based on the size of an organization. Who’s responsible for managing your company’s cybersecurity? In this blog, we offer tips for managing evolving threats. Knowing the…

Read More

HIPAA Requirements for Disposing of Electronic Devices

Every industry is susceptible to data breaches, but healthcare providers are especially vulnerable. Healthcare data breaches have risen over the last decade. In response, the Department of Health and Human Services’ Office for Civil Rights (OCR) has stepped up HIPAA-compliance enforcement, handing out unprecedented fines to covered entities for not following HIPAA breach notification guidelines.…

Read More

Payroll Phishing Scams Aimed at Your Business

Hand writing the text: Scam Alert

Phishing scams targeting businesses have been around for years, but a new round of phishing attacks targeting corporate payroll systems is troubling for small business owners. If an employee falls for a payroll phishing scam, it could compromise your payroll portal. In this blog, we discuss what to look out for and how to boost…

Read More

Understanding the Deep Web and Dark Web

Did you know when you search the web, you’re only scratching the surface? Below that is an encrypted network where both legitimate and illegal activities take place. It’s the biggest portion of the internet you don’t know about. In this blog, we discuss what you need to understand about the deep web and dark web.…

Read More

What to Do after a Data Breach

Hackers exploit weak access controls, technical vulnerabilities, and negligence to gain access to sensitive corporate data. That’s why having a proactive security approach for your business is critical. But what happens if data is stolen and compromised despite all your efforts? In this blog, we discuss what steps to take after a data breach. 1.…

Read More