For years, examiners have pressed banks to incorporate pandemics in their GLBA risk assessment and provide appropriate planning to address a possible pandemic. Until this year, that risk seemed remote. It was difficult to imagine just how strongly a pandemic could affect not only the bank, but the entire community, region, nation, and world. Community […]
Category Archives: (Tech) Security
Being a victim of a security breach can be quite costly, from all aspects, ranging from downtime to even having a tarnished brand image. But the unfortunate truth is many SMBs are still not fully equipped, or even prepared to handle a security breach of any kind. A reputable managed service provider, like RESULTS Technology, […]
In 2020, it will be more important than ever to keep up with what’s affecting technology and the small business. Most cyber attacks occur because of weak, outdated technology that can’t keep up with the latest ransomware, virus, malware or phishing scheme.
More and more, ransomware has emerged as a major threat to individuals and businesses alike. It’s distributed in a variety of ways and is difficult to protect against because, just like the flu virus, it is constantly evolving.
It pays to take extra precautions when surfing the web. We’ve compiled these three easy tips that can amp up your online security.
RESULTS Technology has joined the National Cybersecurity Awareness Month (NCSAM) initiative, held annually in October, by signing up as a Champion and joining a growing global effort to promote the awareness of online safety and privacy. NCSAM is a collaborative effort among businesses, government agencies, colleges and universities, associations, nonprofit organizations and individuals committed to […]
We hear a lot of talk about data security because of the constant threat of cyber attacks and hacking. News of data breaches are extremely common. You may find yourself dwelling on the threat … what would you do in the event of a disaster? How would you access your data? Luckily, there is a […]
Healthcare companies and the vast amount of valuable patient information they hold have become a major target of cyberattacks. Hospitals must combat this with a highly trained team of technicians equipped with the following technologies and security tools. Strict access policies To control access to protected health information (PHI), your IT department must introduce access […]
- 1
- 2