Don’t wait for that update!

One way that you can keep your cybersecurity stance and digital-identity safer, is to allow for those updates to happen as soon as they are released - assuming that it is from an application or program that you have chosen to use or that is required by your workplace. Sometimes...

My Favorite FREE Apps to Boost Business Productivity

Let's talk business for a moment. There are thousands and thousands of free business apps flooding the market, vying for our attention. Which ones are valuable? Which ones are legit? Who has time to sort through them all? My name is Tracy Hardin, and I am a nerd and business...

Do You Have a Home Cybersecurity Plan?

Hidden somewhere in your house is an unlocked door - or doors - that may be giving access to information that can be accessed and stolen much more easily than the family heirlooms and jewels. Your home network is an entry point that is far too often overlooked. With school...

What’s the Breach Notification Rule for HIPAA?

Timing is Everything Like most things in healthcare, timing is essential. You need to think quickly and act swiftly during a time when your head might not be set and sorted to do so. And again, like our own health, preparation today can allow for survival and a healthy outcome...

How do people get hacked?

The 2016 State of SMB Cybersecurity Report revealed that half (14 million) of the 28 million small businesses in the U.S. had been hacked by cybercriminals, but why? According to a CNBC survey of 2,000 small-business owners, small businesses are not spending enough on cybersecurity. With human-error being the most...

Ransomware Victims – Could Your Actions Be Illegal?

What we do know for certain is that this week, the government took a stand when it came to another type of criminal behavior, and it was with the ransoms issued by hackers. On October 1, 2020, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) issued...

Are Your Smart Appliances Spying On You?

By getting the latest and greatest, are we inadvertently putting a spy in our home? Do smart appliances have the ability to hear and see what we are doing? The answer is a little complex, but there are aspects of these devices that all consumers should be aware of. First,...

Cybercriminals in Disguise: Are you a victim of Business Email Compromise (BEC)?

Business Email Compromise (BEC) scams have been growing in popularity for some time now. If you’re not familiar with BEC, it’s when a fraudulent email is sent to a company or individual, and the email appears to be from a legitimate business resource or person, often varying from the legitimate...

Working from home? It’s never too late to evaluate!

While you might still use the dining room or coffee table as a desk, the physical setup is not as important as the setup of things not easily seen at first sight. Cybersecurity needs to be top-notch and if you haven't addressed it yet, now is the time. There are...