Warning: Billing scam targets healthcare providers

There is a scam affecting multiple states where the billing service TRPN Direct Pay sends a $15 check that appears to be a legitimate payment of some kind. However, this payment is actually a one-time “license fee” that, if cashed, signs the healthcare provider up for a billing scheme where they greatly discount their services …

Warning: Billing scam targets healthcare providers Read More »

img-blog-image-responsiveness-in-IT-r1

What responsive IT support looks like

Being “responsive” is frequently used doctrine at Umbrella Managed Systems, but we wanted to ask ourselves what does being responsive mean to us? Traditionally, when IT companies say they are responsive, they are referring to their standard helpdesk support services. Quite often these metrics include the time it takes to engage, respond, and resolve an …

What responsive IT support looks like Read More »

/holiday-diet-and-exercise-tips/

A guide to CIS Critical Security Controls

For organizations of all sizes in every industry, cyber crime is a serious and evolving threat. As reported by Forbes, 2020 was a record-breaking year for data breaches and cyber attacks. With the pandemic presenting new opportunities for attackers, 78% of IT teams say they lack confidence in their cybersecurity posture according to a recent …

A guide to CIS Critical Security Controls Read More »

img-blog-image-healthcare-scam

Be vigilant of the latest healthcare postal scam

Cyber criminals are going back to basics by targeting healthcare organizations via post. This is the latest in a string of inventive attack methods leveraged throughout the Covid-19 pandemic. A recent warning from the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) flagged this new tactic, in which victims receive …

Be vigilant of the latest healthcare postal scam Read More »

img-blog-image-HIPAA

New HIPAA standards: what you need to know

In January 2021 the US government signed into law cybersecurity bill HR 7898, known as the HIPAA Safe Harbor Bill. This amendment has important information security consequences for companies operating in healthcare. This article explains the compliance impacts of these new HIPAA standards along with some practical actions for implementing them.   HIPAA Safe Harbor …

New HIPAA standards: what you need to know Read More »

img-blog-image-secure-frameworks

Introduction to Cybersecurity Frameworks

One of the most practical ways to improve information security and ensure long-term compliance with relevant industry regulations is to use a recognized security framework. Cybersecurity frameworks developed by government agencies and non-profit organizations can help you establish actionable best practices and policies to manage your company’s cybersecurity risks. Two key cybersecurity frameworks are the …

Introduction to Cybersecurity Frameworks Read More »

img-blog-image-online-pay

Why IT costs are rising

It may be hard to hear, but your IT bill should be rising. If it isn’t, there’s a good chance you’re not being well served by your IT provider. Technology is changing rapidly, and cyberattacks are on the rise. Unless your IT processes and cybersecurity measures evolve with the times, your business could face noncompliance, …

Why IT costs are rising Read More »

img-blog-image-kansas

Real world examples of security breaches from Kansas City companies

Cybersecurity threats are increasing at an alarming pace, with criminals targeting small- and medium-sized businesses (SMBs) over larger, more well-defended companies. What will the projected cost of cybercrime be in 2021? $6.1 trillion dollars, according to a report by Cybersecurity Ventures. It’s easy to say, “It will never happen to me”, but the reality is …

Real world examples of security breaches from Kansas City companies Read More »

blog-image-security-breach

Microsoft Exchange Server security breach

On March 2, 2021, Microsoft released a number of security updates to address recently exposed vulnerabilities in Exchange Server. Microsoft announced that the four vulnerabilities have been used as part of a limited, targeted attack chain, in which email communications were infected with malware which enables long-term access to the victims’ networks. Flaws in Exchange …

Microsoft Exchange Server security breach Read More »

img-blog-image-umbrella-top-cybersecurity-threats

Antivirus, EPP, EDR? Don’t worry — we make it all make sense

Cybersecurity is a complex discipline that requires ever more advanced solutions to deal with modern threats. For an organization trying to mitigate their cybersecurity risks, the situation is further complicated by the range of different solutions available. From traditional antivirus to an assortment of newer three-letter technologies like EPP and EDR, this article helps demystify …

Antivirus, EPP, EDR? Don’t worry — we make it all make sense Read More »

Let’s get started!

Scroll to Top