Technology News & Learning Center
Topics
Stop Insider Theft & USB Drive-By with Zero Trust
Nov 18, 2024 | Aditi Zero Trust, Data Breach, Hackers, IT Solutions, Security Learning
Remember Physical Data Security Just like fortified castle defenses, most electronic data security focuses on the internet. Phishing emails, malicious websites, unsavory social media links, public Wifi connections, and weak passwords. All are potentially exploited by data thieves. But what about the old school...
3 Cybersecurity Strikes Against Marriott for $52 Million Settlement
Oct 23, 2024 | Data Breach, Hackers
Big Company, Big Breaches, Big Settlement If you've ever stayed at hotel, you've probably stayed with Marriott. Marriott International is the world's largest hotel company. Nearly 8900 properties in 141 countries and territories. Wow! That's a lot. They have another distinction: Marriott and now subsidiary...
How QuickBooks & Lacerte can weaken security and help hackers
Oct 10, 2024 | Hackers, Security Learning
What to do when your software needs Windows Admin rights: safely using QuickBooks & LacerteOverview Lacerte and QuickBooks require Administrative Windows user level permission to keep software updated. This is different than the various QuickBooks user level accounts within QuickBooks. Why does this matter? As...
HIPAA Training May 14, 2024
May 2, 2024 | Compliance, HIPAA, Security Learning, Training
HIPAA Compliance Requires Training Federal privacy laws called HIPAA and HITECH require those companies that fall under HIPAA rules to training their employees and especially those people in their Privacy Workgroup. Don't know what a Privacy Workgroup is? Don't know what HIPAA is? Aren't aware of the penalties or...
What’s the Score? National Vulnerability Database
Apr 10, 2024 | Hackers, Malware, Security Alert, Security Learning
Weakness Scoring System Our Federal government division witin the Department of Commerce, under the National Institute of Standards and Technology, NIST, has a National Vulnerability Databaase designed to help the public, and especially the technical administrators of IT systems to guage potential weaknesses or...
Watch Your Keys – YubiKey Manager Advisory
Apr 10, 2024 | Security Alert
Security Advisory Yubico, maker of YubiKeys, issued this advisory of vulnerabilities in their software application YubiKey Manager GUI https://www.yubico.com/support/security-advisories/ysa-2024-01/WHO DOES THIS AFFECT? Keys are Good. Program has vulnerability. Only users of YubiKey Manager GUI versions perior to...
Live HIPAA Data Privacy Training May 17th
Apr 19, 2023 | Compliance, HIPAA, Training
Are you subject to HIPAA requirements? Do you know the penalties for non-compliance? Can you avoid a data breach or ransomware attack?In-Person or Hybrid Zoom Livestream HIPAA Privacy & Security Training Training 9 am -4 pm PacificWednesday, May 17, 2023 Tri-West, LTD Showroom,11925 Pike St, Santa Fe Springs,...
Is Blockchain a Security Savior for Healthcare and Us All?
Nov 3, 2022 | HIPAA, IT Solutions, Security Learning
The Goals of Blockchain: Trust and Security What is Blockchain? Blockchain explained for non-coders Blockchain is a way of recording that sequentially links every revision of a a record, in a distributed / shared log (or ledger for finance folks). Every transaction is recorded in an every growing record chain....
Data Security Risks and Importance of Cybersecurity
Oct 11, 2022 | Compliance, Data Breach, Hackers, HIPAA, Podcast, Security Learning
Listen in as we kick off Cybersecurity Month with another great interview by Dorothy Cociu on the Benefits Executive Roundtable. In this show we discuss hot security topics and security breaches in 2022 and 2021. Find out what's been happening and what you can avoid being a statistic! Listen and follow the podcast...
Cybersecurity 2.0 – The Latest on Cyber-Attacks, Ransomware and the Need for Risk Assessments
May 20, 2022 | Data Breach, Hackers, IT Solutions, Security Learning, Uncategorized
Aditi co-founders Ted Mayeshiba and Ted Flittner are interviewed in this lengthy article written by Dorothy Cociu, President of Advanced Benefit Consulting. We invite you to learn more about current computer and phone electronic data security threats and how to avoid some of them. Highlight Topics Include Are...