4 Things You Didn’t Know About the Dark Web
Sure, you’ve heard of the dark web, but do you know what it is actually used for and how to access it? More importantly, should you even try to access it?
Security Expert Talks On-Premise Firewall
Local security expert, Phillip Long, advises business owners on a defense-in-depth, security strategy in latest tech video about on-premise firewalls. Listen to Phillip discuss best practices with your firewall. Watch now! About the Speaker, Phillip Long Phillip Long is a Certified Information Security Systems Professional (CISSP) and author of Everything You Must Know About Choosing […]
Security Expert Discusses Cloud Based Email Filtering
Phillip Long, a Certified Information Security Systems Professional (CISSP), talks cloud based email filtering in his latest Defense-in-Depth series video. During the video, he gives best practices for email security. Check it out below! About the Speaker, Phillip Long Phillip Long is a Certified Information Security Systems Professional (CISSP) and author of Everything You Must […]
Security Expert Discusses Cloud-Based Firewall
Phillip Long, a Certified Information Security Systems Professional (CISSP), continues through his Defense-in-Depth series. This week he discusses how a multi-layer security approach with a cloud-based firewall will help prevent security breaches. Watch it below! About the Speaker, Phillip Long Phillip Long is a Certified Information Security Systems Professional (CISSP) and author of Everything You […]
Security Expert Discusses Proper Network Design
Phillip Long, a Certified Information Security Systems Professional (CISSP), discusses how a proper network design will reduce your chances of a security breach through his Defense-in-Depth series. Watch below! About the Speaker, Phillip Long Phillip Long is a Certified Information Security Systems Professional (CISSP) and author of Everything You Must Know About Choosing an IT […]
Passwords For Primary Protection Are No Longer Valid. Now What?
If you tend to use the same, or similar, passwords for more than one site, or if a password is your only tool for credentials and authentication, you could be putting your organization – and yourself – at risk for identity theft and/or a security breach.
How Phishers Are Using Encrypted Sites to Scam You
Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams.
4 Cyber Security Predictions for 2018
If 2017 has shown us anything, it’s that even major organizations can come to a grinding halt due to cyber security attacks. This message probably won’t come as a surprise to many businesses. After all, several big-name brands have suffered embarrassing data breaches in recent years, causing significant financial and reputational damage. What makes this […]
3 Simple Steps to Make Sure Your Law Firm is HIPAA-Compliant
If any of your clients are involved with health care, you know how highly regulated the field is. You may think you are complying with all the regulations and have lock-tight security measures in place at your law firm. But you could be wrong. Thirty-two percent of breaches in recent years were caused by IT […]
Tips to Maintain ePHI Security on Mobile Devices
More organizations are utilizing smart phones, laptops and tablets for daily operations but failing to include these devices in a company-wide risk analysis could lead to mobile device security issues. Entities need to maintain ePHI security and understanding the potential risks associated with mobile devices is a key part of that, which the OCR stressed […]