Categories

Archives

The Next Step in Data Breach Recovery: Rebuild and Reassess

How to Respond Following a Cyber Security Breach Cybercrime is an ever-changing landscape that is getting more and more sophisticated, wreaking havoc on business owners across the globe. As more and more companies suffer breaches and ransomware attacks that leak private and corporate information to the public, it’s now more crucial than ever to have […]

Read more

Lessons Learned from Massive Ransomware Attack Against US Dental Clinics

Protecting Your Dental Practice Against a Ransomware Attack Approximately 400 dental practices across the United States recently made one of the worst possible discoveries – they learned of a crippling ransomware attack that left them without access to any patient charts, x-rays, and their practice’s schedule and payment ledger. As a result, they were unable […]

Read more

IT Manager’s Dilemma – I Already Have a Team…

In my job I get to speak to a lot of technology managers – Information Technology and Information Management directors, managers, and CIOs. There is often a common thread in those discussions, and I am going to lump many organizations and discussions into a fictitious manager in a fictitious organization that I will describe in […]

Read more

The BYOD Generation

“Hold on, Daddy – I want to take a video of that!” my daughter shrieks as she grabs my mobile phone… next thing I know, it’s uploaded to Facebook, my wife has been updated on her Twitter account, and my son has already texted a picture taken on his phone, complete with location details, all […]

Read more