• Skip to main content
CALL US TODAY! 859-245-0582 or Pay Your Bill Online
Next Century Technologies Logo
  • Home
  • Services
    • IT Support
    • Managed Services
    • HIPAA Compliance
    • Bank IT Compliance
    • Managed Services for CPAs
    • Business Continuity and Offsite Backups
    • Voice & Data Cabling
    • Business Phone Systems – VOIP
    • Hardware & Software Sales
    • Web Design and Hosting
    • Public Speaking & Training
  • About
    • Our COVID-19 Policy
    • Careers
  • Blog
  • Contact
×
  • Home
  • Services
    • IT Support
    • Managed Services
    • HIPAA Compliance
    • Bank IT Compliance
    • Managed Services for CPAs
    • Business Continuity and Offsite Backups
    • Voice & Data Cabling
    • Business Phone Systems – VOIP
    • Hardware & Software Sales
    • Web Design and Hosting
    • Public Speaking & Training
  • About
    • Our COVID-19 Policy
    • Careers
  • Blog
  • Contact
Let's Work Together

Blog

Stay up to date in new trends in IT and cyber security. Have an interesting topic you'd like our thoughts on? Get in touch with us today!

two factor authentication on a pc

What is Two-Factor Authentication (2FA)?

By Tracy Hardin | June 3, 2020
When it comes to cybersecurity, the terms and acronyms thrown around by professionals can seem confusing, making the entire concept of security a daunting one to understand. Two-factor authentication, or 2FA, can be one of those terms. Simply put, it is the process of using not one method of securing...
IoT device connected to smart phone

What are IoT devices?

By Tracy Hardin | May 27, 2020
"IoT" is a relatively new term, one that many of us may be unfamiliar with. However, there is a good chance that you're using at least one IoT device on a daily basis! The simplest definition of an IoT (Internet of Things) device is any object that can connect to...
Home office

Work From Home Tools

By Tracy Hardin | May 19, 2020
During the second week of March 2020, Next Century Technologies shifted its workforce to work-from-home status and put a halt to almost all on-site visits. Staying productive and communicating well while at home is quite the challenge. We leveraged our existing technology to make this happen but still ran into...
post-it note plan

What is incident response?

By Tracy Hardin | May 13, 2020
What are the steps of an incident response plan? While every organization may have different structures and terminology, generic steps of most plans include: Preparation - compile a list of assets, and identify risks to those assets.Detection - discover and analyze the security incident.Containment, Eradication, and Recovery - contain the...
Windows Getting Ready Screen

Windows 7 End of Life Creates New Opportunities for Scammers

By Tracy Hardin | April 29, 2020
They say when one door closes another one opens, but in this case, it's a window. On January 14th, 2020, Microsoft ended its support for Windows 7. Since Microsoft is no longer offering patches or security updates for vulnerabilities identified in Windows 7, hackers have a new way of gaining...
Tablet displaying a VPN on the screen.

What is a VPN?

By Tracy Hardin | April 20, 2020
Most of us try to keep our personal information and work information safe and private. Makes sense! Nobody wants a stranger peeping over their shoulder watching what sites they access and what data they are entering. Unfortunately, being on an unsecured internet connection, that scenario is a realistic probability. VPN...
telehealth doctor on cell phone

Using Telehealth During the COVID-19 Crisis

By Tracy Hardin | April 16, 2020
In light of the COVID-19 pandemic, the HHS Office for Civil Rights has announced that for HIPAA-covered healthcare providers, a Notification of Enforcement Discretion will be applied that relaxes the HIPAA compliance in relation to telehealth. This notice covers "all services that a covered health care provider, in their professional...
Image of male working remotely on a laptop.

How To Safely Work Remotely

By Tracy Hardin | April 1, 2020
Effective Immediately It's important that ALL employees understand their organization's expectations when working from home, and that ALL employees practice safe cybersecurity to ensure their data stays protected. All those organizations with remote workers should have a Remote Work Policy in place that outlines those expectations and employees should be...
Front office of Next Century Technologies

Work from Home Case Study

By Tracy Hardin | March 26, 2020
Thanks to the Coronavirus, work from home has taken on a new significance. Most companies from the services industries must adapt to work from home or risk a shutdown from local governments trying to keep people out of the workplace. In this blog we will do a case study on...
doc looking at computer

Cybercriminals Now Demand Ransoms from Patients

By Tracy Hardin | January 25, 2020
At first, you might chuckle thinking, there is no way this is true. But unfortunately, you soon find out that this “warning” is anything but a joke. Now, you’ve got to be asking yourself, how could this happen? You may start thinking about all the accounts you have online. Facebook,...
What is the difference between a vulnerability scan and a penetration test (pentest)?

What is the difference between a vulnerability scan and a penetration test (pentest)?

By Tracy Hardin | January 3, 2020
What is a vulnerability scan? Vulnerabilities are flaws in software that can be exploited by hackers to gain access to your network or sensitive data including protected health information (PHI). Vulnerabilities can be in computer operating systems such as Microsoft Windows XP, 7, 8, 10 or Windows Server. They can...
Finger pointing at risk analysis

Risk Analysis: What you need to know

By Tracy Hardin | November 26, 2019
You’ve likely heard of a risk analysis. Hopefully, you’ve also performed one for your organization. Whether you’ve been helping your organization work on its HIPAA compliance or dealing with financial regulations or government contracts, performing a risk analysis should be a high-priority item on your business’s to-do list. So, what...
  • « Previous
  • 1
  • 2
  • 3
  • 4
  • Next »

Get In Touch!

859-245-0582

1795 Alysheba Way Unit 5104, Lexington, KY 40509

Click Here to Contact Us

Additional Resources

About
Resources
Privacy Policy

About Us

Since 2001, our goal has been to create a relationship with our partners to provide IT services, becoming a trustworthy asset to support growth of your company.

© 2019 Next Century Technologies. All Rights Reserved.

Let's Work Together!

We're looking forward to helping with your IT needs! Please fill out the form below to get in touch, or call us at 859-245-0582 and we'll help make your technology run smoothly.

  • This field is for validation purposes and should be left unchanged.