Phishing - Would you fall for it?

Phishing - Would you fall for it?

Would you fall for one of these phishing emails?   Some phishing campaigns astonishingly get up to a 45% response rate.  We give 3 practical tips on how to avoid getting your identity stolen through a phishing scam.

Friday, March 17, 2017 / Categories: Identity TheftSmall BusinessWorkplace Communication

Cybersecurity Terms and Tips for Small Businesses

1 in 5 Small to Medium sized Businesses have been targeted by Cybercrime

 

Cyber crime is a rapidly growing criminal business, impacting millions of people and organizations around the world. Cyber crime costs the global economy up to $500 billion annually. Consumers spent $25 billion and 1.2 billion hours dealing with security issues from counterfeit software in 2014. And one in five small- and medium-sized businesses have been targeted by cyber crime.

Staying HIPAA Compliant with Online Data Storage

Keeping patient records secure and private is the concern of every hospital and health care provider, but they are often overwhelmed with years and years of patient information and the lack of adequate storage space. Destroying these health records in order to make room for more storage is often not an option. Patients want access to all of their health care records, and physicians need them in order to better diagnose patients. Online data storage is a way to satisfy all of these issues. Using online storage for these records allows easier access for patients, and offers easier sharing of patient information from hospital to physician, as well as from physician to physician. Storing health records online isn’t, however, without security concerns. Patients, hospitals, and physicians want assurance that these confidential records will remain safe, private, and secure, and will only be accessed by those authorized to do so.

Tuesday, March 4, 2014 / Categories: Identity Theft

Password Strength is Vital in Protecting Your Business and Personal Information

In today's technologically driven business marketplace one of most often overlooked points of vulnerability to your business and personal security is the strength or weakness of the passwords that you define for usage when logging into: your computer network, email provider, online banking, accounting or payroll applications. To underestimate the importance of strong passwords is to leave the door wide open to identity theft and corporate piracy. Your passwords must be a robust combination of all the characters that are available, must be unique for different applications and must not be a word commonly found in any dictionaries, in any language.

Tuesday, March 4, 2014 / Categories: Identity Theft

6 Tips for Using Passwords to Protect Against Identity and Business Theft

Ah, those pesky passwords. If you work in the corporate world or in an office, you have one for your PC/Network and, unless there is a password synchronization application that combines them, you probably have more than one for other applications.

Tuesday, March 4, 2014 / Categories: Identity Theft
RSS