Skip to main content

Tagged With "Protected"

Comment

Re: The Heavy Toll of Poor Data Security in Healthcare

tonyl ·
I am out of the office until 09/01/2014. I will respond to your message when I return. Note: This is an automated response to your message "Post By Art Post: The Heavy Toll of Poor Data Security in Healthcare" sent on 8/27/2014 8:12:05 AM. This is the only notification you will receive while this person is away.
Comment

Re: How dentists should comply with HIPAA

Keith Thompson ·
I am out of the office until 08/04/2015. I am away if you need to talk to someone please contact Darren Downey our GM Office 633-9264 X 226 Cell 204.229.7231 My Cell is 204.890.8570 Note: This is an automated response to your message "Post By David Bailey (Guest): How dentists should comply with HIPAA" sent on 4/1/2015 11:14:20 PM. This is the only notification you will receive while this person is away.
Comment

Re: What HIPAA does and how the healthcare industry has been complying

John Mooney ·
What's really comical is while MFP vendors are touting the great features of their HIPAA complaint systems, walk through a typical sales office and I guarantee you'll be able to find a lease with a personal guarantee and a person's SS# left out somewhere on a desk.
Comment

Re: Cybersecurity in healthcare - Why there needs to be more concern

Keith Thompson ·
I am out of the office until 12/02/2015. I am away untill Feb 12th if you need to talk to someone please contact Darren Downey our GM Office 633-9264 X 226 Cell 204.229.7231 Note: This is an automated response to your message "Post By Art Post: Cybersecurity in healthcare - Why there needs to b..." sent on 2/9/2015 10:52:41 PM. This is the only notification you will receive while this person is away.
Comment

Re: IT Security, Compliance Become a Difficult Balancing Act

Sherri ·
Thank you for your e-mail. I will be out of the office and have limited access to my e-mail from March 31st through April 10th.. I will review your message upon my return. In my absence please feel free to contact Jim Singer ( jim@kopi.ws ) or Cynthia Wankum ( cynthia@kopi.ws ) for immediate assistance during this time. Have a great day! Sherri Wilbers President KOPI 518 Cheyenne Drive Jefferson City, MO 65109 573-893-4545 (ext. 203) www.kopi.ws sherri@kopi.ws
Event

Datto Roadshow - Minneapolis

Topic

Data Protection and Security Ranked Among Top Five Managed Services by MSPs in Enterprise Strategy Group Report

Art Post ·
Toronto, Canada, May 07, 2020 --( PR.com )-- Leading cloud backup, recovery and restore software provider Asigra Inc., today highlighted the findings in a new report by IT research firm Enterprise Strategy Group, revealing the activities and traits of successful managed service providers (MSPs), the technologies generating the highest recurring revenues and business practices and delivery models that ensure the highest long-term value of these organizations. The report, titled, "MSP Partner...
Comment

Re: Email Security is Moving Into More Prominent Positions

HUNTER BUSINESS SYSTEMS ·
Art what time is good today I néed 20 m minutes steve Steve s iPhone > On Aug 4, 2014, at 4:54 PM, Print4Pay Hotel < alerts@hoop.la > wrote: >
Comment

Re: A Closer Look at Data Breach Avoidance & Response

tonyl ·
I am out of the office until 07/14/2014. I will respond to your message when I return. Note: This is an automated response to your message "Post By Art Post: A Closer Look at Data Breach Avoidance & Respo..." sent on 7/9/2014 9:07:01 AM. This is the only notification you will receive while this person is away.
Reply

Re: docSTAR(TM) Acquires DocuLex Document Management Product Suite From Protected Trust LLC

Art Post ·
WOW, I was surprised to see this! Protected Trust is one of our advertisers and they offer a variety of products that are available to the dealer channel. Looks like they mean business with Managed Services. Check them out here https://protectedtrust.com/Partners/
Comment

Re: Holes in a fence: How the approach to cybersecurity is changing

richj ·
I am out of the office on annual leave until the 26th Jan. In my absence please contact 01983 406522. Thank you
Comment

Re: Implementing basic cybersecurity in a small healthcare business

richj ·
I am out of the office on annual leave until the 26th Jan. In my absence please contact 01983 406522. Thank you
Blog Post

Power Protection and Murphy’s Law

David D’Agostino ·
Raise your hand if you’re familiar with Murphy’s Law. For those unfamiliar, it’s the idiom that “anything that can go wrong, will go wrong.” You’ve likely experienced this at some point in your life, and a great...
Blog Post

Healthcare - The Road Ahead for Patient Record Protection

David Bailey (Guest) ·
IT security has finally become a more central and critical priority among health care leaders in the past few years, and this could not have come soon enough given the immense volumes of records exposed of late. Identity theft has been the most...
Topic

Intronis Launches Education Campaign to Promote Data Protection Best Practices

Art Post ·
Intronis LLC has launched an educational campaign promoting the importance of data protection and offering a variety of tips and best-practice resources. National Cyber Security Awareness Month encourages Americans to take a vested interest in...
Blog Post

As Mobility Spreads, Healthcare IT Security Must Be Enhanced

David Bailey ·
The healthcare industry has become a bit more mobile-centric in the past few years, driven by the need for agile, always-on operations that fit the preferences of both employees and clientele. When watching trends in the IT manufacturing sector, it has become clear that personal computers are likely to continue falling in shipments and investments, replaced by the adoption of and rising expenditures related to smartphones, tablets and portable computers. What's more, the mobility arena has...
Blog Post

The Continuing Issue of Reactionary IT Security in Health Care

David Bailey ·
Health care providers have been hot and cold with respect to protecting patient data of late, as many have made progressive moves to protect their systems and information, while others have lagged behind in this regard. Although retailers and others...
Blog Post

IT Security, Compliance Become a Difficult Balancing Act

David Bailey ·
Organizations in health care and virtually every sector have been challenged significantly of late when it comes to protecting information from breach, exposure, theft and loss, as so many threats have emerged in such a small period of time. The cost of experiencing a major data breach is going up quickly as the years pass, and the rate of entities (healthcare providers) to not have been impacted by one of these events is falling fast as well. These are some of the many reasons why...
Topic

AMETEK Electronic Systems Protection Announces Promotion of Dave Perrotta to Director, Business Manager

Art Post ·
AMETEK Electronic Systems Protection Announces Promotion of Dave Perrotta to Director, Business Manager KNIGHTDALE, NC – April 21, 2016 – AMETEK Electronic Systems Protection, a recognized leader in advanced power protection and intelligent diagnostics, today announced that Dave Perrotta has been named Director, Business Manager, for the organization. In this role, Perrotta will have responsibility for the entire AMETEK Electronic Systems Protection organization and report directly to George...
Blog Post

The BYOD Side of Health Care IT Security

David Bailey ·
In the past several years, plenty of trends in corporate IT have taken shape and intensified, but perhaps none quite as impactful and challenging as enterprise mobility. Sure, the Internet of Things is beginning to scale up and challenge managers in the IT department, but it will take years for this trend to see the same types of gains in adoption as enterprise mobility and, specifically, BYOD, have seen of late. Lost or stolen devices, rogue IT, poor control over access, no governance and...
Blog Post

At-risk data companies should know about

David Bailey (Guest) ·
In this modern technological age, disaster recovery plans are necessary for businesses. Cyberattacks have become unavoidable for all organizations, so companies need to prepare themselves for hard-hitting hackers and keep themselves on high alert....
Blog Post

How can healthcare organizations choose and use email encryption?

Art Post ·
Email Encryption has become an important asset for healthcare organizations in a world where cybersecurity is a necessity. Although it doesn't seem like the most fancy or complex protection tool, it can be an amazing resource for email...
Blog Post

Beyond the Breach: General Data Management Considerations

Art Post ·
Much of the news related to information governance has related directly back to security and data breaches in recent years, and for good reason as a wealth of organizations have fallen victim to theft and exposure in that time frame. First and...
Blog Post

Healthcare organizations at risk of Shellshock vulnerability

Art Post ·
Security threats are growing in abundance as more health organizations choose to host large quantities of patients' personal and medical information in data centers, locally and across the country. A recent study from McAfee discovered over 31 million...
Blog Post

Email is alive, well and evolving

Art Post ·
Email is a part of everyday life. It should come as no surprise, then, that it is widely used in corporate environments. Many believe that email will not be around for much longer due to the adoption of social media, text and instant messaging and...
Blog Post

Data breaches in healthcare costing millions

Art Post ·
The healthcare industry is undeniably a target of cybercriminals. With the increased usage of electronic health records, healthcare organizations have large volumes of data stored in data centers, on employee devices and sent through email. However,...
Blog Post

The Latest Health Care Breach Might Be the Worst

David Bailey (Guest) ·
Health care data breaches have been growing in frequency and subsequent damages for years now, while the vast majority of the events actually take place on a smaller scale among community providers. However, in the past couple of months, this has not...
Topic

ID-protection and advertising kiosks expanding network with digital signage software

Art Post ·
Identity Shred LLC, a shredding kiosk network operator in university mailrooms, has announced its conversion to and expansion via BroadSign International LLC's automated digital signage software, according to a release from the companies. According to the announcement, Identity Shred is "the first and only networked shredding kiosk of its kind," complete with a 22-inch HD LCD touchscreen. The kiosk enables students to protect themselves from identity theft using NSA-rated crosscut shredding,...
Blog Post

Email security has transcended into ridiculousness

David Bailey (Guest) ·
While it is never good to make light of a serious situation such as IT security, businesses as well as health care providers and government agencies have been making it quite difficult to keep a lid on hilarity. That was meant to evoke "Hillary," in...
Blog Post

Health Care Still Struggling with Email Security

Art Post ·
The health care sector has come under fire of late due to an increased prevalence of data breaches, privacy failures and more, while many of the more damaging events have actually been the result of relatively simple mistakes. Although the retail...
Blog Post

Common Threats to Health Data Security and Their Consequences

David Bailey (Guest) ·
The health care industry has been under the gun of late because of the increasing prevalence of major data breaches that have exposed the medical records of millions of individuals around the globe. As more entities fall victim to these events,...
Blog Post

Implementing basic cybersecurity in a small healthcare business

Protected Trust (Guest) ·
Big businesses like Sony Pictures Entertainment and Target have had information compromised by hackers, giving small business customers a reason to be wary. What can an enterprise do to implement cybersecurity and appeal to a hesitant audience? The...
Blog Post

How HIPAA may be affected by Obama's cybersecurity proposal

Art Post ·
President Barack Obama reiterated his goal to change cybersecurity in his State of the Union address on Tuesday. He hopes to accomplish more secure data through legislative modifications and his own cybersecurity proposal. However, healthcare...
Blog Post

Cybersecurity in healthcare - Why there needs to be more concern

Art Post ·
Cybersecurity has become a huge concern for the healthcare industry in more ways than one. Forbes reported that in 2011, Jerome Radcliffe, a diabetic, demonstrated how his wireless insulin pump could be hacked at a Black Hat cybersecurity conference....
Blog Post

3 tips for being HIPAA-compliant in the healthcare industry

Art Post ·
HIPAA compliance can be tough. However, with a variety of data security worries on the minds of many, it has never been more important, as the penalties for HIPAA violations are expensive. For instance, it cost two organizations nearly $2 million...
Blog Post

5 trends that will affect the Healthcare IT sector this year

David (Guest) ·
Trends are always affecting the healthcare IT community and this year looks no different with a variety of technological tools expected to become more popular. Cybersecurity is always important in regard to the cloud, the Internet of Things and big...
Blog Post

What HIPAA does and how the healthcare industry has been complying

David Bailey (Guest) ·
HIPAA, or the Health Insurance Portability and Accountability Act, has been a huge source of interest since cyberattacks became prevalent in the business world. Many people have argued that hackers will begin to focus on the healthcare industry, due...
Blog Post

How dentists should comply with HIPAA

David Bailey (Guest) ·
Dentists should ensure their methods of HIPAA compliance are up to date. According to Dentistry IQ, all positions within the dental field have to know how to approach the legislation, including receptionists, assistants, dental hygienists and IT...
Blog Post

5 Internet and secure email tips

Art Post ·
Hillary Clinton has certainly been under fire in the news recently for her insecure email usage. However, there are many strategies businesses can teach their employees and learn from Clinton's mistakes to ensure safe technology use in the workplace....
Blog Post

Two severe Windows vulnerabilities addressed, another two unpatched

Art Post ·
Windows users might have noticed that on the morning of Nov. 13, they were greeted with a large number of updates for their systems. This is all too common of a problem for IT departments as they scramble to patch servers, desktop computers and...
Blog Post

The past, present and future of cybersecurity

Art Post ·
Protecting enterprises with cybersecurity tools has been a long process, one filled with failed attempts, confusion and human error. Furthermore, many new infrastructure-as-a-service offerings are attempting to provide IT departments with high-levels...
Blog Post

Health care industry is No. 1 for cyberattacks

Art Post ·
The FBI has warned that cyberattacks are on the rise - and health care companies are often the target hackers seek. An attack that took place in August on Community Health Systems Inc., the No. 2 publicly traded U.S. hospital group, compounded concern...
Blog Post

Cybersecurity predictions for 2015 - Healthcare

Art Post ·
Cybersecurity has been in the news quite a lot over the past year given the breaches sustained by Sony Pictures and retail stores like Target and Home Depot. What kind of changes in cybersecurity are happening, and what can customers expect in 2015?...
Blog Post

The state of cybersecurity in the health care industry

Art Post ·
The health care sector should prepare for cybersecurity in 2015, as it's expected to become a huge target. Breaches within the sector can prove even more costly than those afflicting other industries, with HealthITSecurity reporting that such...
Blog Post

Holes in a fence: How the approach to cybersecurity is changing

Art Post ·
The Sony Entertainment cyberattack is not yet old news. On the contrary, the breach is still affecting the idea of cybersecurity and how important it is for organizations to have protection in place. The mystery of who was behind the attack on Sony is...
Topic

docSTAR(TM) Acquires DocuLex Document Management Product Suite From Protected Trust LLC

Art Post ·
SCHENECTADY, NY --(Marketwired - May 06, 2014) - docSTAR, a division of Astria Solutions Group LLC, an award-winning developer of cloud and on-premises enterprise content management software (ECM), announced today that it has acquired the DocuLex suite of document management products of Winter Haven, Florida-based Protected Trust LLC ( www.protectedtrust.com ). The asset acquisition will complement and extend docSTAR's existing ECM portfolio and installed base and will add more than 1,000...
Blog Post

A Closer Look at Data Breach Avoidance & Response

Art Post ·
Data breaches have become some of the more dangerous and frequent threats to corporate continuity in the past few years, as many organizations have struggled to either avoid or recovery from major instances of information loss and exposure. In many...
Blog Post

Data and Email Encryption get left behind

Art Post ·
The IT security community has faced a challenging, uphill battle when it comes to modern data and communications protection, especially as hackers become more diverse and complex in their tactics. Regardless of industry or region, virtually every...
Blog Post

Email Security is Moving Into More Prominent Positions

Art Post ·
Boardroom executives have had to be exceptionally agile when developing and releasing new forms of security controls for their information technology and communications frameworks, especially as the frequency of damage associated with breaches...
Blog Post

The Heavy Toll of Poor Data Security in Healthcare

Art Post ·
In what has become a farce of sorts, health care providers appear to remain far behind the learning curve when it comes to data, network and email security, as breaches have been on a torridly rising path in the past few months. Although retailers...
 
×
×
×
×
×