Vendor Due Diligence During a Crisis

by Sarah Harvey / June 15, 2023

For years, businesses have relied on third-party vendors to provide critical business functions, and this especially true today as the surge of remote workers continues and third-party vendors work tirelessly to meet the influx in demand. Third-party vendors are also doing what they can to help offset the impact of the health crisis - they’re banding together to offer free products and services. As we all adjust to social distancing…

5 Security Awareness Training Tools You Need

by Sarah Harvey / June 15, 2023

Security awareness is important. That’s not a new concept to anyone in IT or even employees who have had to complete some level of security awareness training. But, how can you ensure your security awareness training program is meeting industry standards? How can you get the most of out the training your employees complete? In a time where many people are transitioning to remote workplaces and work from home setups,…

DNS Hijacking Threatens Remote Employees

by Sarah Harvey / December 16, 2022

In a recent discovery by Bitdefender, new router DNS (Domain Name System) hijacking attacks have been targeting home routers and redirecting victims to fake coronavirus pages. These attacks have focused on leading people to download applications that are infected with Oski malware. The malware has the ability to extract browser credentials, cryptocurrency wallet passwords, and other valuable information. In a time where many employees are working remotely from home offices,…

Business Continuity Plan Checklist

by Sarah Harvey / November 20, 2023

The world is full of unexpected events. You never know when your organization will be hit with a disaster. Developing a detailed business continuity plan (BCP) is the best way to prepare your organization to jump into action when disaster strikes. Every organization is different and will need a customized BCP that details their specific processes and procedures to implement in case of a disaster. What should you include in…

HIPAA vs. HITRUST CSF: Which One Should I Choose?

by Sarah Harvey / June 13, 2023

Stolen medical records, research, prototypes, prescriptions, devices – there are so many ways that healthcare organizations can be compromised. Each of these risks threaten patient care in a different way, but they could each lead to life-or-death consequences. That is why it’s so important that healthcare organizations undergo the right type of information security audit – to ensure that they are protected in every way that they can be. We’ve…