Data Security Blog
HIPAA Requirements for Disposing of Electronic Devices
Every industry is susceptible to data breaches, but healthcare providers are especially vulnerable. Healthcare data breaches have risen over the last decade. In response, the Department of Health and Human Services’ Office for Civil Rights (OCR) has stepped up HIPAA-compliance enforcement, handing out unprecedented fines to covered entities for not following HIPAA breach notification guidelines.…
Read More Payroll Phishing Scams Aimed at Your Business
Phishing scams targeting businesses have been around for years, but a new round of phishing attacks targeting corporate payroll systems is troubling for small business owners. If an employee falls for a payroll phishing scam, it could compromise your payroll portal. In this blog, we discuss what to look out for and how to boost…
Read More Security Tip: Sextortion…What It Is and How to Protect Yourself
I know we all tend to think that we, our co-workers, families and friends are too smart to fall for something like this. BUT…(you knew that was coming, right?) we have seen incidents like these happen. I strongly recommend that you read this, share with your families and friends, and stay smart out there in…
Read More Understanding the Deep Web and Dark Web
Did you know when you search the web, you’re only scratching the surface? Below that is an encrypted network where both legitimate and illegal activities take place. It’s the biggest portion of the internet you don’t know about. In this blog, we discuss what you need to understand about the deep web and dark web.…
Read More What to Do after a Data Breach
Hackers exploit weak access controls, technical vulnerabilities, and negligence to gain access to sensitive corporate data. That’s why having a proactive security approach for your business is critical. But what happens if data is stolen and compromised despite all your efforts? In this blog, we discuss what steps to take after a data breach. 1.…
Read More Free Insider Threats eBook!

Click to learn more about our partnership:
Click to verify our protection from data security breaches & fraud:
Click to view our security score on SecurityScorecard:
Click to view our SOC 2 Type 1 Certificate of Completion:
Click to learn more about our membership:
Get Updates
"*" indicates required fields