OpenNotes portal initiative gaining steam

OpenNotes portal initiative gaining steam

A recent initiative to give healthcare patients access to the notes their doctor or clinician writes about their visit is continuing its meteoric rise across the country. OpenNotes began a few years ago by researching the benefits of allowing patients to have access to their doctor’s notes.

Image uploader security flaw discovered

Image uploader security flaw discovered

Unfortunately, we’re confronted with new web security threats every day, and today is no different. Experts have exposed a flaw in ImageMagick, one of the internet’s most commonly used image processors, that could put your site in harm’s way. By learning more about this vulnerability you’ll take the first step toward better protecting your content.

4 different types of hackers

4 different types of hackers

Hackers come in all shapes and sizes. From kids trying to gain notoriety on the Internet to political groups trying to send a message, the motives for a cyber attack vary widely. So how can you protect yourself? It all starts with getting to know your enemy a little better.

Ransomware alert for healthcare practices

Ransomware alert for healthcare practices

Ransomware is becoming a growing problem for the healthcare industry. And with around a dozen attacks on hospitals being reported since the beginning of the year, you may be wondering just how severe the problem is. Should you be alarmed? How can you protect your practice? Here’s an inside look at how the ransomware epidemic is affecting the US and Canadian healthcare systems.

New Office 365 feature for more secure email

New Office 365 feature for more secure email

Most of us like to think we’d never click on a suspicious link in an email. But the fact of the matter is this is one of the most common ways a business is hacked. We’re all human of course, and we make mistakes. Yet now Microsoft is trying to prevent this.

Manage the security risks of virtualization

Manage the security risks of virtualization

Virtualization security is a topic that often goes undiscussed on the Internet, and you may even think it’s a non-issue because of this. However, like the rest of your technology, a virtualized infrastructure must be secured. To help keep yours protected, here are some of the security risks involved with virtualization and how you can go about mitigating them.

Should you monitor your employees online?

Should you monitor your employees online?

To monitor your employees, or not to monitor, that is the topic of this blog post today. If you’ve ever considered monitoring your staff’s online activities, you may’ve been lost as to whether or not it’s the right decision. So we’ve listed the pros and cons of doing it, and some tips to make it a success if you go through with it.

Office 365 migration security musts

Office 365 migration security musts

More and more small and medium-sized businesses are making the switch from on-premises SharePoint systems to cloud-hosted Office 365. If you’re one of them, it’s vital to ensure that you put in place adequate protection to counter the security challenges that come with the migration.

IT security concerns of the finance sector

IT security concerns of the finance sector

The time to increase cyber situational awareness and establish better security strategies has never been more opportune. Since 2015, the number of attacks on the financial services sector has increased and shows no signs of letting up. Whether it be extortion or credential-stealing malware, different tactics are utilized to target desired areas.

Be more productive with Office 365

Be more productive with Office 365

When you first purchased Office 365, you were likely hyped about the productivity gains it can produce. But if your business has yet to realize them, you may be feeling a bit miffed or agitated that the service didn’t deliver on its promise. However, it’s wise to remember that in order to get the most out of a service, regardless of what it is, you need to know how to utilize it properly.