Technology News & Learning Center
Topics
Cybersecurity in the Workplace and Home
Mar 16, 2021 | Uncategorized
https://advancedbenefitconsulting.com/s2e18-cybersecurity-in-the-workplace-and-home Host Dorothy Cociu interviews principals of Aditi Group, our Technology Partners, on cybersecurity in the workplace and home. Dorothy sits down with Ted Mayeshiba, Ted Flittner and Steve Saitman to discover what can be done to protect...
S1E1 – Not So Happy Hour at Coors and Microsoft
Mar 13, 2021 | Data Breach, Hackers, Podcast, Security Alert
In this episode cyber security experts from Aditi Group tell us about why things are not Golden at Coors this week. And you'll learn about the hack that is sweeping the planet with Microsoft Exchange. This first Friday Happy Hour edition podcast uncovers network security issues at Molsen-Golden that have had big...
The Basics of Social Engineering
Jun 3, 2020 | Compliance, Hackers, HIPAA, Personal Privacy Invasion, Security Learning
Where Are You Most Vulnerable? Hackers understand that employees are often the weakest link in an organization’s security. That’s why 98% of cyber attacks rely on some type of social engineering, costing companies $billions every year. Are you familiar with these new Cyber criminal techniques that can leverage ANY...
Does HIPAA Still Apply with Work at Home and COVID-19?
Apr 27, 2020 | Compliance, HIPAA, Security Alert
City, State, and Federal agencies have variously required or advised that offices should be closed and workers have transitioned to work in their own homes. Does this mean that HIPAA requirements no longer apply? This is an emergency situation right? Surely some of the rules don't apply now. Limited Waiver The...
Separate the Kingdom with a VLAN
Apr 21, 2020 | IT Solutions, Security Learning
You're working at home. Only YOU should be able to access the company data. It also crops up in offices with different divisions or departments. Not just anyone and everyone should be able to view, copy, edit or worse, DELETE, the files that don't pertain to them. You've Gotta Keep 'Em Separated We all do it. We are...
OCR Imposters – Office for Civil Rights Investigators, Are They Real?
Apr 4, 2020 | Compliance, HIPAA, Security Alert
Thieves Are Hitting People in Times of Stress HHS has published several warnings recently, including this statement on April 3rd, that businesses should be ever vigilant against imposters posing as HHS / OCR investigators. April 3, 2020 Alert: Individual Posing as OCR Investigator It has come to OCR’s attention that...
NSA Finding Leads to Windows Security Update
Jan 15, 2020 | Security Alert
Download and install the Windows updates released on January 14, 2020 immediately! Not every update from Microsoft is as critical as this one for your security. But this should be processed immediately. https://media.defense.gov/2020/Jan/14/2002234275/-1/-1/0/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF...
What’s the harm in sharing your mobile number?
Oct 22, 2019 | Data Breach, Hackers, Personal Privacy Invasion, Security Learning
For some of you, it has (prior to this) been routine to punch in your phone number as an identifier for "club reward" points at the grocery store or other retail location. Yet, for many of us, mobile phone numbers especially follow us from apartment to apartment to home. We don't change that number often, if at all....
October is National Cybersecurity Awareness Month
Oct 16, 2019 | Data Breach, Hackers, Personal Privacy Invasion, Security Alert
Wondered why you've likely seen a bunch of articles about cybersecurity recently? Well, we should think about cybersecurity once in a while! The linked article is a good general deep dive into how to think about keeping your family safe in this connected world. Good advice about what to do if you think you've been...
World Password Day – Why It’s Important
May 5, 2016 | Hackers, Security Learning
Today is the day. You've been putting it off for months or years. Your IT department harps on it. Your credit card companies and banks send out calls to update. And you may have automated messages or even lock-outs from more advanced systems, all geared to keep you changing things. Why change? The conventional...