• Insights
  • Recent Posts
  • Popular Posts
  • Popular Tags

  • Why Cyber Security Should Be Your Top Priority

    , Director of Integrated Marketing, All Covered

    eBookAs more and more core parts of our clients’ business have moved online or into the cloud, they have become increasingly concerned with cyber security. Malware, vulnerabilities and hacking have become part of their most pressing concerns, not something they’re content to simply leave to the IT guys.

    This rapidly evolving  security threat environment calls for a more comprehensive information security approach that goes beyond systems management to active protection. Thus, we’ve evolved our managed IT services and tweaked the name to go with the change: we’re now All Covered Care – Secure and Protect. (more…)

    Cloud, Content Management, From Our Experts, Security, Solutions, Strategy, Technology

    , , , , , , ,

    cyber-securityGartner estimates about 6.4 billion Internet of Things (IoT) devices today, such as DVRs, surveillance cameras, and many others, all connected to the Web and all with Internet (IP) addresses. By 2020, it is expected that the number of Web-connected devices will increase to 20.8 billion.

    So, why are these numbers relevant to healthcare cyber-security?

    An IoT fact is that these devices were not designed or developed with security at their core. Further, these devices are typically not configured securely.

    IoT = Internet of Threats!

    The focus of this article is to walk through the security challenges associated with IoT devices, which are proliferating healthcare entities. We will examine four key steps that a health-care entity should take to be better positioned to address this area of emerging cyber-risk.

    Why the IoT-driven Internet Wobble on October 21 Matters in 2017 (more…)

    From the Experts, Security

    , , , , , , , , , , , , ,

    Print

    Security should be a driving force and not an afterthought for senior executives and their boards.

    It is important that senior executives require that their organization formally establish a credible cyber security program. It starts with setting strategic security objectives that must be achieved by December 31, 2016, and December 31, 2017. Think near-term, and think far! The organization must address security and compliance as a life-cycle, as a process. It will lower business risk! (more…)

    Content Management, From the Experts, Security, Strategy, Technology

    , , , , ,