• Skip to main content
CALL US TODAY! 859-245-0582 or Pay Your Bill Online
Next Century Technologies Logo
  • Home
  • Services
    • IT Support
    • Managed Services
    • HIPAA Compliance
    • Bank IT Compliance
    • Managed Services for CPAs
    • Business Continuity and Offsite Backups
    • Voice & Data Cabling
    • Business Phone Systems – VOIP
    • Hardware & Software Sales
    • Web Design and Hosting
    • Public Speaking & Training
  • About
    • Our COVID-19 Policy
    • Careers
  • Blog
  • Contact
×
  • Home
  • Services
    • IT Support
    • Managed Services
    • HIPAA Compliance
    • Bank IT Compliance
    • Managed Services for CPAs
    • Business Continuity and Offsite Backups
    • Voice & Data Cabling
    • Business Phone Systems – VOIP
    • Hardware & Software Sales
    • Web Design and Hosting
    • Public Speaking & Training
  • About
    • Our COVID-19 Policy
    • Careers
  • Blog
  • Contact
Let's Work Together

Blog

Stay up to date in new trends in IT and cyber security. Have an interesting topic you'd like our thoughts on? Get in touch with us today!

Cybersecurity and Phishing

What is Cyber Insurance?

By Tracy Hardin | October 24, 2019
What is the Standard for Cyber Insurance? Cyber insurance is a quickly-evolving product that is still fairly new. No standards exist, but here’s a list of coverages to consider when purchasing a policy: Data liability. This covers damages and defense costs resulting from any claim against the insured from a...
open server (Large)

Why SMBs Fail After a Cyberattack

By Tracy Hardin | July 1, 2019
1.       Unable to afford IT staff With so many key entry points where a hacker can gain access to an organization’s data, it is critical that a proper IT team is in place. Not only is it important to have an IT team in place to implement the appropriate security measures,...
Skyscrapers

10 Cybersecurity Tips for Businesses

By Tracy Hardin | June 12, 2019
Is it that small businesses don’t care about cybersecurity? It wouldn’t be fair to make that assumption; however, small businesses do often overlook cybersecurity concerns. This could be the result of many different things. For example, small businesses often do not have the resources to dedicate to cybersecurity. In fact,...
Two people working

Five Greatest Cybersecurity Threats to Businesses

By Tracy Hardin | May 20, 2019
E-mail Phishing Attacks: Those would be the fake e-mails that appear to come from a trusted source. They contain a malicious link or file attachment. The link may look identical to an authentic website to solicit your credentials or infect your network. The attachments will usually contain malware/viruses. Did you...
stethoscope-2617701_1920

What is a Risk Assessment?

By Tracy Hardin | May 20, 2019
As a reminder, one of the most important aspects of complying with the HIPAA Security Rule is to perform a Security Risk Assessment (also known as a Security Risk Analysis) to evaluate how an organization is protecting patient data.  Every organization covered by HIPAA (Covered Entities and Business Associates) must perform an...
audit-4189560_1920

What triggers a HIPAA audit?

By Tracy Hardin | May 16, 2019
What is HIPAA? The Health Insurance Portability and Accountability Act, better know as HIPAA, was passed by Congress in 1996 and called for the protection and confidential handling of protected health information (PHI). HIPAA still exists today, aiming to protect patients and their information, but it’s important to think about...
Receptionist

What are the HIPAA standards for IT?

By Tracy Hardin | April 6, 2019
A HIPAA covered entity is more than just a doctor's office or hospital - its any business that comes in direct contact with a patient's PII (personally identifiable information). This includes not only medical providers but law firms dealing with medical cases, health insurance companies and medical billing services. HIPAA...
Standing at rack landscape (Large)

What are the benefits of managed services?

By Tracy Hardin | April 6, 2019
Do you have a reactive or proactive mindset? Do situations, events or the latest crisis dictate your next step? You might be a reactive thinker. Do you take situations in stride, have a plan B when something goes wrong and plan ahead to avoid a crisis? You are being proactive....
Network racks and cloud

How do I pick a cloud provider or vendor?

By Tracy Hardin | April 6, 2019
Next Century Technologies protects and manages information technology for clients from many different industries and fields. When we are looking for a new cloud-based service, whether it be for storage, or backup, or Office365 distributor, we follow our banks’ standards and look for these features in all our cloud providers:...
  • « Previous
  • 1
  • 2
  • 3
  • 4

Get In Touch!

859-245-0582

1795 Alysheba Way Unit 5104, Lexington, KY 40509

Click Here to Contact Us

Additional Resources

About
Resources
Privacy Policy

About Us

Since 2001, our goal has been to create a relationship with our partners to provide IT services, becoming a trustworthy asset to support growth of your company.

© 2019 Next Century Technologies. All Rights Reserved.

Let's Work Together!

We're looking forward to helping with your IT needs! Please fill out the form below to get in touch, or call us at 859-245-0582 and we'll help make your technology run smoothly.

  • This field is for validation purposes and should be left unchanged.