Tag Archives: Cyber security

Firmware: the threat most users overlook

For decades, one of the most foundational principles of cyber security has remained the same: Always update and patch your software. But for most people, hardware is exempt from this process. They think of hardware as nothing more than a vessel for software to occupy — and that’s totally incorrect. Read on to learn more […]

Posted in General Articles A, Hardware | Also tagged , , , , | Comments closed

When did you last update your firmware?

Most IT consultants constantly remind clients of how important it is to update and patch their software, but neglect the importance of updating hardware. We don’t mean replacing it with new hardware; we mean updating the applications and settings coded into the physical IT powering every modern office. What is firmware? Firmware is a very […]

Posted in General Articles B, Hardware | Also tagged , , , , | Comments closed

Outdated firmware is worse than you realize

As workplace IT gets more and more hi-tech, the average user gets further from the building blocks that keep it running. At times that seems like a good thing, but if you aren’t aware of the most basic aspects of your hardware, you could be vulnerable to a nasty cyber attack. Make sure you’re secure […]

Posted in General Articles C, Hardware | Also tagged , , , , | Comments closed

Are your printers safe?

This is not a question often asked by anyone who has ever used a printer. Given the increasing sophistication of hackers’ capabilities, the discovery that cyber thievery can, in fact, be performed through some popular printer brands hardly comes as a surprise. One study reveals that at least 20 printer models are vulnerable to Distributed […]

Posted in General Articles A, Hardware | Also tagged , , , , | Comments closed

Popular printer brands are prone to attacks

Do you have security measures in place for your office’s printers? By “security,” we don’t mean locked doors or watchful guards; we’re referring to security against hackers that use printers as a weapon. Despite many companies going paperless, printers are still essential in most offices. And based on recent reports, popular printer brands are targeted […]

Posted in General Articles C, Hardware | Also tagged , , , , | Comments closed

Vulnerabilities in popular printers

What harm could possibly come from printing a document? According to some researchers who performed a large-scale analysis of printer attacks, a lot. These could be in the form of Distributed Denial-of-Service (DDoS) attacks, which are as devious as they sound, or attacks made through extracted print jobs. Today, we unveil the mechanics of this […]

Posted in General Articles B, Hardware | Also tagged , , , , | Comments closed

2017 HIPAA forecast: 3 important reminders

Although totally necessary, data privacy regulations are often a gigantic headache. And king among the various compliance standards is HIPAA. Despite the legislation’s enactment back in 2003, the rules governing electronic medical records and protected health information continue to change and evolve every year. Let’s take a moment to go over three things you need […]

Posted in General Articles C, Healthcare | Also tagged , , , , | Comments closed

HIPAA in 2017: 3 crucial considerations

When talking about IT within the healthcare industry, it’s pretty difficult for conversations to stray too far from HIPAA compliance. And as the number of audits and penalties continue to increase, those conversations only become more prevalent. As small- and medium-sized businesses review their policies at the beginning of a new year, let’s cover some […]

Posted in General Articles B, Healthcare | Also tagged , , , , | Comments closed

3 Reminders for HIPAA compliance in 2017

Even if notable punishments and fines for HIPAA non-compliance have only been doled out over the last 6 years, data privacy regulations have been around for 14. And with each passing year, these rules evolve in ways that make it near impossible to keep up without an expert on hand. As we kick off 2017, […]

Posted in General Articles A, Healthcare | Also tagged , , , , | Comments closed

The ransomware that makes you sell your soul

Ransomware has become a fast-track for making money for some hackers this holiday season. But instead of just demanding a small payment for the decryption code that will unlock their computers, some hackers are demanding that victims sacrifice two other friends to ensure they receive the code they need. Read more to find out what […]

Posted in General Articles C, Security | Also tagged , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.