What Is PII, Non-PII, and Personal Data?

What Is PII, Non-PII, and Personal Data?

Data security becomes more important with each passing year. It’s important to have a good understanding of the terms that both governments and the information security industry use. Understanding these terms will help you lead your organization to comply with today’s regulations as well as whatever new regulations are coming down the pike. Today we’ll […]

read more
Church Hit with Business Email Compromise

Church Hit with Business Email Compromise

There was big business security news out of Brunswick, Ohio (a part of the Cleveland metro area) last month, this time involving a church. According to local reporting, the St. Ambrose Catholic Parish recently announced to parishioners that they had been swindled out of a whopping $1.75 million. The attackers’ methods have real implications for churches […]

read more
Happy Mother’s Day!

Happy Mother’s Day!

May 12th is Mother’s Day – what are your plans to mark the occasion? Flowers? A special meal? A day out with the kids?   Whatever your plans are, take some time this Sunday to celebrate all of the mothers in your life, not just your own. And if this is your day? The Radius […]

read more
Malware attack hits US accounting firms

Malware attack hits US accounting firms

A major accounting software and cloud services company has been hit by malware, affecting their many clients across the US. Wolters Kluwer, a major provider of tax accounting software and cloud services, has been hit by malware. The many financial software services they offer to clients across the country have been down since Monday, May […]

read more
Security Issues That May Leave Medical Practices Vulnerable

Security Issues That May Leave Medical Practices Vulnerable

Healthcare providers have a legal obligation to keep patient data security, whether it’s at rest on a server or in transit to the cloud or a third party. To maintain regulatory compliance and the confidence of your patients, your practice needs to be vigilant in the technologies that it deploys to make sure that all […]

read more
What Is Open Source Software?

What Is Open Source Software?

For today’s tech blog we’re going to discuss open source software. What is it, and how is it different from other types of software? In simple terms, open source software is a term for any program whose source code has been publicly released, allowing for others to modify it however they like. Software Types It’s […]

read more
Support Ending For Windows 7

Support Ending For Windows 7

Microsoft announced they are stopping mainstream support for Windows 7. This is a popular operating system, so this creates concern for many. All support for Windows 7 will end on January 14, 2020.

read more
How AI Is Saving Orthopedic and Sports Medicine Practices An Hour Each Day

How AI Is Saving Orthopedic and Sports Medicine Practices An Hour Each Day

The red tape that normally surrounds the administration of patients in the healthcare industry is a leading cause of physician burnout, as many data experts have noted. Healthcare providers are responsible for a growing volume of paperwork and other off-patient work, and the trend towards greater bureaucracy seems to be inevitable. By some estimates, one […]

read more
Microsoft Accounts Targeted For Months, Hackers Serve A Security Reminder

Microsoft Accounts Targeted For Months, Hackers Serve A Security Reminder

Microsoft began notifying Outlook.com users of a 2019 security breach that occurred between January 1st and March 28th. Hackers were unintentionally given unauthorized access to some accounts, where they were then able to view subject lines, email addresses, and folder names. While no login details—including passwords—were directly accessed as part of this breach, Microsoft did […]

read more
Essential List of Cybersecurity Terms to Know in 2019

Essential List of Cybersecurity Terms to Know in 2019

As the digital community continues to expand to include more individuals and more devices, enforcing cybersecurity becomes more complicated. The number of opportunities and vulnerabilities for hackers to leverage is continuously growing; it is imperative for businesses to take proactive measures to protect themselves. With new terms and acronyms constantly emerging to refer to these […]

read more
What Role Do Robots Play In Healthcare?

What Role Do Robots Play In Healthcare?

Artificial intelligence and robotics are poised to change the entire economic landscape over the coming decades, with an estimated 30% of existing jobs poised to be taken over by robots by 2030. Nowhere is this more evident than in healthcare. Many healthcare tasks are routine and prone to human error, making them prime targets for automation. At […]

read more

Search Our Tech Insights