As explained in last week’s Security Tip, we advise businesses to assess how their staff, volunteers, and contractors are using portable wireless devices for business tasks. To get you started last week, we provided this template for your Step 1 Inventory. If this process seems burdensome, just keep in mind there could be a lot … Continue reading Security Tip: What are your people doing with WiFi? (Part 2)
Do you have employees, contractors, or volunteers who use a smartphone or laptop at your facility, and also take it offsite? If the answer is yes, it’s time for you to do a bit of information-gathering. Why? Because you need to understand how these devices are being used, so you can provide guidelines and help … Continue reading Security Tip: What are Your People Doing with Wifi? (Part 1)
When you download software applications, whether free or paid, there are important precautions you and your staff should take. Following these guidelines will help your business improve cyber-security and reduce the risk of data breach. 1 DO advise your employees to follow these tips, and to avoid downloading games on workplace computers if possible. Even … Continue reading Downloading software? Watch out!
Look before you leap! There are pros and cons to cloud data storage. If you decide cloud is not for you, we offer another type of offsite data storage. Backups Cloud storage means your data will be backed up offsite for use in a crisis. In practice, you might be surprised at how long it … Continue reading Security Tip: Cloud Considerations & Alternatives
As an organization that keeps, stores, or transmits PHI (Personal Health Information), you know that your network and computers must be maintained, protected, and used in a way that complies with HIPAA technical rules for privacy and security. But what about the security of other devices that connect to your network? Here are some categories … Continue reading HIPAA Tip: Device Security for Compliance