Trent Peters

img-blog-image-HIPAA

New HIPAA standards: what you need to know

In January 2021 the US government signed into law cybersecurity bill HR 7898, known as the HIPAA Safe Harbor Bill. This amendment has important information security consequences for companies operating in healthcare. This article explains the compliance impacts of these new HIPAA standards along with some practical actions for implementing them.   HIPAA Safe Harbor …

New HIPAA standards: what you need to know Read More »

img-blog-image-secure-frameworks

Introduction to Cybersecurity Frameworks

One of the most practical ways to improve information security and ensure long-term compliance with relevant industry regulations is to use a recognized security framework. Cybersecurity frameworks developed by government agencies and non-profit organizations can help you establish actionable best practices and policies to manage your company’s cybersecurity risks. Two key cybersecurity frameworks are the …

Introduction to Cybersecurity Frameworks Read More »

img-blog-image-online-pay

Why IT costs are rising

It may be hard to hear, but your IT bill should be rising. If it isn’t, there’s a good chance you’re not being well served by your IT provider. Technology is changing rapidly, and cyberattacks are on the rise. Unless your IT processes and cybersecurity measures evolve with the times, your business could face noncompliance, …

Why IT costs are rising Read More »

img-blog-image-kansas

Real world examples of security breaches from Kansas City companies

Cybersecurity threats are increasing at an alarming pace, with criminals targeting small- and medium-sized businesses (SMBs) over larger, more well-defended companies. What will the projected cost of cybercrime be in 2021? $6.1 trillion dollars, according to a report by Cybersecurity Ventures. It’s easy to say, “It will never happen to me”, but the reality is …

Real world examples of security breaches from Kansas City companies Read More »

blog-image-security-breach

Microsoft Exchange Server security breach

On March 2, 2021, Microsoft released a number of security updates to address recently exposed vulnerabilities in Exchange Server. Microsoft announced that the four vulnerabilities have been used as part of a limited, targeted attack chain, in which email communications were infected with malware which enables long-term access to the victims’ networks. Flaws in Exchange …

Microsoft Exchange Server security breach Read More »

img-blog-image-umbrella-top-cybersecurity-threats

Antivirus, EPP, EDR? Don’t worry — we make it all make sense

Cybersecurity is a complex discipline that requires ever more advanced solutions to deal with modern threats. For an organization trying to mitigate their cybersecurity risks, the situation is further complicated by the range of different solutions available. From traditional antivirus to an assortment of newer three-letter technologies like EPP and EDR, this article helps demystify …

Antivirus, EPP, EDR? Don’t worry — we make it all make sense Read More »

The top 5 cybersecurity threats in 2021

The cybersecurity threat landscape is ever-expanding and dynamic. As attackers develop more sophisticated approaches, businesses need to be ready to stop them in their tracks.  Successful cyber attacks lead to potentially huge payouts for relatively little risk, making them extremely appealing to criminals. By being aware of the most prevalent cyber threats, you can adapt …

The top 5 cybersecurity threats in 2021 Read More »

Managing the productivity of your remote workers

One of the main challenges with moving to remote work is measuring the productivity of your employees. No leader wants to see their business fall behind. To effectively manage the productivity of your remote workforce, you must first understand the impediments they face.  Once you know what productivity obstacles you’re up against, you can then …

Managing the productivity of your remote workers Read More »

How to maintain your company culture with a remote workforce

The rapid shift towards remote work and working from home (WFH) caused by the global COVID-19 pandemic has presented several challenges for organizations and their IT departments. One of the main challenges many companies have to grapple with is ensuring effective remote team communication.   A strong company culture relies on consistent communication and a collaborative …

How to maintain your company culture with a remote workforce Read More »

Multi-Factor Authentication (MFA): What is it and why do you need it?

In a world where credential harvesting is a constant threat and over 80% of hacking-related breaches are caused by stolen or weak passwords, risk reduction is critical for all organizations. Over the past year, companies worldwide have overwhelmingly shifted to remote work. With employees now accessing company data and programs from multiple locations and devices, …

Multi-Factor Authentication (MFA): What is it and why do you need it? Read More »

Let’s get started!

Scroll to Top