Shellshock, What Does It Mean For Your Organization?
Updated: Added information about Macs and some additional reference links. This new vulnerability is much easier to exploit than heartbleed and can have a huge negative
Updated: Added information about Macs and some additional reference links. This new vulnerability is much easier to exploit than heartbleed and can have a huge negative
The Hospice of Northern Idaho (HONI) has agreed to pay the U.S. Department of Health and Human Services (HHS) $50,000 to settle potential violations of
Many of the clients we work with are either a medical service provider or a vendor to medical service providers. If they are creating, transmitting
Security budgeting is a layered approach Security is important, for an organization, and its customers. However, there is often a misconception that security costs are
All organizations should have a business continuity plan. I know that many do not. How will your business respond if: Your building burns down A
I have some friends staying with me right now from Brazil. They arrived a few days ago, and said that, due to the world cup,
“Bring Your Own Device” or BYOD is becoming an ever increasing topic among CIOs and other executives. We are not here to argue the merits
areas that may be covered in an audit Assign an audit lead internally – yearly internal audit checks, point of contact Plan a portion of your
Part 1 of our “Perimeter Network Security” Hitlist covered the virtual considerations one must consider when securing their network. Now, we will cover the things
1420 NW Vivion Road, STE 102
Kansas City, MO 64118
3000 Riverchase Galleria, STE 700
Birmingham, AL 35244