logo
November 19, 2015 | Vlad de Ramos

The Importance of Two Factor Authentication in Information Security

Ask anyone how their systems, mobile computers, networks and applications are protected and it is highly likely that the answer that you will get is “via passwords.” Ask them again if they feel confident of it or sleep soundly at night thinking that everything is secure, they will likely...
September 17, 2015 | Sarah Greesonbach

3 Ways to avoid HIPAA Violations in a Healthcare Office

The Health Insurance Portability and Accountability Act (HIPAA) defines and establishes compliance regulations for healthcare providers surrounding protected health information (PHI) within healthcare organizations. The consequences of non-compliance are dire, as unsecure PHI can significantly...
...