Let’s face it—your information is probably out there. At a certain point, you’ll recognize when your credentials (most likely) or other personal information is exposed…. read more
Over the last few years, one thing has become clear. Cybercriminals and attackers are no longer “hacking” to carry out their attacks—including the type that… read more
Meaningful Use is often a prickly conversation piece whenever I bring it up with hospital administrators and IT Support teams. The problem? It’s awfully confusing… read more
Hospital security strategists have talked about partitioning networks as a means to protect sensitive data from breaches and attacks for years now. But in a… read more