Exploring the World of IT Management.

Girl Scouts of Orange County averted the breach of 2,800 girls information

Is your daughter a part of the #GirlScouts? Be careful, even the Thin Mints are at risk of a #breach. Read the article about how the Girl Scouts of Orange County averted the breach of 2,800 girls information through an email hack.


38,000 patients at risk via Legacy Health breach

Legacy Health was #breached with the possibility of 38,000 patients at risk. Read more about the breach and who may be affected.

Do you need to comply with HIPAA?

Why do you, as a doctor, dentist or any other medical provider, need to comply with HIPAA?   Listen to my podcast! SoundCloud: Link: https://soundcloud.com/middayreferralnetwork/getting-your-practice-hippa-compliant Even though HIPAA may seem complicated, we have the solution. Our newest offering gives you an all-in-one web-based platform to address your HIPAA comp...


What constitutes a HIPAA breach?

A breach is defined as the unauthorized acquisition, access, use, or disclosure of PHI which compromises the security or privacy of the information. HIPAA violations can have very serious consequences ranging from $100 – $50,000 per incident up to $1.5 Million. The best way to prevent a breach is to always keep PHI confidential and follow proper security practices. Some examples of breaches ...


Cyber Security tips while traveling

Cyber Security is not just for when you are in the office or at home. Sorry, but you are not excluded when you travel. If you have plans on traveling this summer or travel frequently follow these simple but important steps and stay safe: 1. Backup up your data on all devices(your mobile device, laptop, or tablet) before you leave. 2. Backup to the cloud(Google, iCloud, etc) frequently while away. ...

cyber security

What to do if you have Ransomware

Do you or your employees know what to do if your infected with a #virus or have #ransomware? If you suspect yourcomputer is infected: 1. Immediately disconnect the equipment from the Network/Internet. Unplug the network cable or disable wireless. 2. Leave the equipment on; don’t close or open new programs. 3. Write down any messages that appear on the monitor. 4. Note all events that occurred befo...


Do you need to comply with HIPAA?

So, What Is HIPAA? HIPAA, Health Insurance Portability and Accountability Act, established in 1996, sets down rules intended to ensure that organizations with access to patients health information are protecting that highly confidential information appropriately. The Office of Civil Rights (OCR) levies penalties on medical offices for non-compliance which could go to up to $1.5 million per violati...


How to stay safe from Ransomware

Ransomware is a malware that holds your data hostage until you pay up and continues to impact businesses every day. DSS Quick Tip Must Do: Backup your data Ensure your antivirus is always updated Have the lasted security updates installed Implement strong password Don’t Never click links from suspicious emails Never click popups from unknown websi...

Keep a Clean Desk

Whats wrong with this photo? Keep a Clean Desk It makes complete sense and sounds so simple, but keeping a clean desk is often overlooked when talking about data security. It’s also the perfect place to start the discussion with employees. Employees that keep a cluttered desk tend to leave USB drives and smartphones out in the open. They also often forget to physically secure their desktops and ...

End of Year IT Checklist

The new year is quickly approaching.  Make sure you are ready and kick the new year off right. 1. Review all hardware and software maintenance contracts – Whether you have new ones or old ones, you consider reviewing (or having and experts review) your maintenance contracts and to maximize your coverage and remove any unnecessary costs. 2. Clean up you IT network rooms – Over time the ...