12 min read

NIST and Microsoft Password Policy Best Practices

By Sean Doherty on 8/3/22 11:39 AM

Microsoft and The National Institute of Security Technology (NIST) are two of the leading resources for providing strong password policies. In this article, we discuss their recommended strategies to make sure your organization's passwords are strong enough to protect against hackers and cybercriminals. 

Topics: IT Security cybersecurity best practices Password Policy Best Practices password security network security password policy recommendations
3 min read

15 Lessons Learned from a HIPAA Data Breach

By Rose Doherty on 7/25/18 1:14 PM

Implementing a strong HIPAA Compliance framework is a requirement for all Covered Entities and Business Associates, but many practices don't realize this is also their best strategy to prevent a breach from happening!   My hope is that understanding what the OCR will ask you for after a Data Breach will help you implement an IT security framework that will reduce your chances of ever experiencing a data breach.  

Topics: HIPAA Compliance Data Security IT Security cybersecurity ePHI Security HIPAA Risk Analysis
6 min read

8 Tips from the OCR to Prevent a Phishing Attack

By Rose Doherty on 3/14/18 1:23 PM

Phishing remains one of the most successful tactics used by hackers to steal sensitive information such as usernames, passwords, and credit card details. In phishing attacks, cyber-criminals disguise emails to make the recipient think it is from someone they trust, and  The Department of Homeland Security warns that 97% of people can not identify a phishing attempt. Read the following IT security tips from the OCR to learn the best cybersecurity strategies to prevent a phishing attack.  

Topics: IT Security cybersecurity strategies prevent a phishing attack cybersecurity cybersecurity tips
2 min read

Cyber-Security Requires Training Employees

By Rose Doherty on 12/14/15 8:00 AM

Hackers are getting more sophisticated every day, and the ways they lure you to give them access to your computer are downright devious.  It is important that all employees are aware of these simple rules that will help prevent intruders from accessing your computer network. 

Topics: Security HIPAA Compliance Internet Security IT Security