Managing Data at Every Stage of Its Lifecycle

Call Us Today 814-684-5505

Managing Data at Every Stage of Its Lifecycle

Call Us Today 814-684-5505

Security

When Your Vendor is a Big Dog Who Exits the Industry – What Now?

Recently there has been massive upheaval in the IT Asset Management Industry. Executives of one company were sentenced to prison for illegal exports of e-waste. Another very large company, Arrow, just days ago has left the industry completely. After going on an acquisitions frenzy in 2014 where they consolidated about a half dozen of the…

Read More

Viral Doesn’t Equal Valid

The recent “Momo Challenge” and the “Blue Whale Challenge” as referenced in this article, have brought to light a disturbing trend in the age of social media. That is, the wide variety of stories, trends, etc., that “go viral.” The great thing about social media is if you want to share information, it is very…

Read More

A Wake-up Call: Class Action Lawsuits for Data Breaches

Article Written by Renee H. Martin – Partner at Dilworth Paxson LLP and Joseph Harford – Founder and President of Reclamere, Inc. It seems that each day we all read about another data breach: Houzz, Dunkin’ Donuts, Advent health, and others. The concern for executives is not the “if” of a breach but the “when”…

Read More

Security Tip: Airplane Crash Scam Warning

Be on the lookout for emails in your inbox from “analysts” about the recent Boeing 737 Max airplane crashes, asking you to notify your loved ones about possible other airlines “that will go down soon”. These emails come with infected attachments that might make it through the filters, either at the office or at your…

Read More

Important Questions to Ask a Data Destruction Provider

Many corporate data breaches result from negligent data disposal practices. The only way to prevent your company’s proprietary information, customer or patient data, and employee information from falling into the wrong hands, is to have a secure and comprehensive data destruction process in place. In this blog, we offer several important questions to ask a…

Read More

Data Security Tips for National Cybersecurity Month

Cubed background in different sizes and blue colors aligning to a row of glowing information security icons surrounding the word cybersecurity 3D illustration

October is National Cybersecurity Month, an annual initiative for fostering cybersecurity awareness among consumers, businesses, and communities. In that spirit, here are several tips for keeping your data and devices safe: Tip 1: Be Proactive A proactive cybersecurity approach is one of the most effective ways to prevent data breaches. Since vulnerabilities are often overlooked…

Read More

Who’s Responsible for Managing Your Company’s Cybersecurity?

Today’s news is full of reports about cybersecurity breaches. Large, corporate data breaches get the big headlines, but this doesn’t mean small businesses aren’t at risk. Hackers don’t discriminate based on the size of an organization. Who’s responsible for managing your company’s cybersecurity? In this blog, we offer tips for managing evolving threats. Knowing the…

Read More

HIPAA Requirements for Disposing of Electronic Devices

Every industry is susceptible to data breaches, but healthcare providers are especially vulnerable. Healthcare data breaches have risen over the last decade. In response, the Department of Health and Human Services’ Office for Civil Rights (OCR) has stepped up HIPAA-compliance enforcement, handing out unprecedented fines to covered entities for not following HIPAA breach notification guidelines.…

Read More

Payroll Phishing Scams Aimed at Your Business

Hand writing the text: Scam Alert

Phishing scams targeting businesses have been around for years, but a new round of phishing attacks targeting corporate payroll systems is troubling for small business owners. If an employee falls for a payroll phishing scam, it could compromise your payroll portal. In this blog, we discuss what to look out for and how to boost…

Read More