Entries by Jim Nash

, , , ,

Anatomy of a Spear Phishing Attack

Spear phishing is an attempt at gaining access to someone’s information using a very targeted and specific approach. It is a common occurrence in the U.S., and it happens virtually every day. Because of that, you should become familiar with the tricks that these criminals use to get people to fall prey to their attacks. Here are some tips for identifying a spear phishing email.

, , , , ,

HIPAA Compliance Doesn’t Have to Be Like Pulling Teeth

If your healthcare practice is transmitting data in a way that doesn’t comply with HIPAA regulations, you’re facing more than just potential fines. Behind every piece of data is a person who would be affected greatly if that data was leaked. Here are some ways that your practice can both be compliant and protect people.

, , ,

The Business Impact of a Data Breach

A data breach has a business impact that extends far beyond the responsibilities of your IT department. For this reason, organizations need to think about treating information security and cybersecurity like a business issue rather than an IT one. When preparing and approving an IT budget for your company for next year, think about the effects a data breach might have on your organization and why it’s important to build defenses against them.