Are Cybercriminals Phishing for Your Sensitive Business Information?
With phishing attacks steadily on the rise, businesses have to be especially careful when clicking links or opening email messages from untrusted sources. The chart below shows the number of unique phishing websites detected monthly, from the last quarter of 2015 through the first quarter of 2016. Schedule a free IT security assessment an…Read More
Cybersecurity: The New Morse Code?
While sitting in one of my favorite coffee shops, someone asked me what I did for a living, so I told them. They were in their 70s and said: “I don’t understand all that cybersecurity stuff, it’s way over my head…” So I began to ask her how much she knew about things like the Pony…Read More
5 HIPAA Requirements For IT Contingency
The HIPAA Administrative Safeguards for ensuring ePHI is not only backed and can be recovered, the spirit of this CFR is to ensure ePHI is resilient. CMS calls it “Contingency Plan § 164.308(a)(7)”. The purpose of contingency planning is to establish strategies for recovering access to ePHI should the organization experience an emergency or another…Read More
Setting the Stage for IT Operational Greatness – Act I, Here We Go!
The most prosperous companies today ensure that their IT environment promotes both productivity and sustainability, right from the very beginning. How can you create a setup that guarantees both? Stable people, process, products, and partners will lend strength to each branch of your business if you allow it to. Through this article, my goal is…Read More
I Think I Need to Sit Down … I Didn’t Understand a Word of That
This article is about ITSM, yet another technical term. But do you understand what it is or even care? I will try to explain why you should know and care, in non-technical terms unlike like a mechanic that said… Once the timing belt went, the cams spun out of control and broke the rocker arms….Read More
Spring Cleaning Is Coming Soon… Don’t Let Your Get Scrubbed
If you think most data breaches are due to malicious insiders, you’d be wrong. Forrester found that only 12% of security incidents are caused by disgruntled employees with mal-intent. Whereas, a whopping 27% of security breaches were caused by employees’ inadvertent misuse of data.2 This means that if your business does experience a security breach,…Read More
Gamification For Better Health?
In one of the LinkedIn Groups, I’m a part of; the question was asked How do we motivate people to become active participants in improving their health? Here’s my response “One thing I have been doing for years to get X (X = End Users, Patients, Executives, etc.) to become more active (from a technology acceptance viewpoint)…Read More
5 Key Elements In Using the ITIL Framework to Manage the Boom in Blockchain
Blockchain is likely here to stay. Read this article I authored that’s been picked up by Simplilearn.com, one of the world’s leading certification training providers. They partner with companies and individuals to address their unique needs, providing training and coaching that helps working professionals achieve their career goals.Read More
Think Ahead with Azure!
Businesses can’t ask where they want to be in 5 years without considering where they want their tech to be as well. The way I handle our IT solutions has a direct impact on how I manage business, growth, and disaster. How do I build solutions now that will work later? By developing solutions that…Read More
As an IT Service Management consultant, I work with customers to select the best services to support their IT and make it secure. It’s my job to know the difference between a trend and solutions worth adopting. In this cloud market, I recommend Microsoft Azure. They’re an efficient, secure, flexible, and cost-effective method for data…Read More