Advice from a failed disaster recovery audit

Advice from a failed disaster recovery audit

We can write about disaster recovery planning (DRP) until our fingers bleed, but if we never discuss real-world scenarios it’s all just fumbling in the dark. Examining these successes and failures is the best way to improve your business continuity solutions, and the recent audit of a state government office is rich with valuable takeaways. […]

Vulnerabilities on WordPress websites

Vulnerabilities on WordPress websites

“Easy-to-use,” “SEO-friendly,” “open-source,” and “customizable.” These are some of the words that best describe WordPress, currently the most popular Content Management Solutions (CMS) platform. With thousands of websites affected in a recently launched series of attacks, “easy to target,” “hackers’ favorite,” and “prone to attacks” could soon be used to define the experience of running […]

What exactly is preventive cyber-security?

What exactly is preventive cyber-security?

There has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses love the idea of preventing cyber-attacks and data breaches before they happen, and service providers would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events. But it’s not always clear what proactive cyber-security means, so let’s take […]

G Suite vs. Office 365

G Suite vs. Office 365

Google and Microsoft have both set impressive milestones in the tech industry. These industry giants continually roll out innovative solutions that simplify the lives of users around the world, especially with G Suite and Office 365. This raises a question: Which is a better option for your business? Cost and commitment G Suite offers two […]

Browser showdown: which one is right for you?

Browser showdown: which one is right for you?

Back when Internet Explorer was competing against Netscape, users had far fewer things to consider. Nowadays, some users do nearly all their work inside of a web browser, and they have far more options about which program to use. If you’ve ever questioned whether there might be a better way to browse the web, we’ve […]

360 Advanced Completes HITRUST CSF Validation for HOSTING

HOSTING is one of the nation’s largest cloud services providers

360 Advanced, a national IT assurance and compliance services firm and HITRUST CSF Assessor, announces that its client, HOSTING, has completed the rigorous third-party HITRUST validation attesting to its compliance with demanding healthcare data security and privacy standards.

Medac, Inc. Completes SOC 2 Type 2 and HIPAA Assessment, Proving Medac’s Dedication to Consumer Data Security

NORTH AUGUSTA, S.C., Feb. 06, 2017 (GLOBE NEWSWIRE) -- Medac, Inc., a Medical Business Management Services provider, today announced the company has successfully completed a Service Organization Control 2 (SOC 2) Type 2 certification under AT Section 101.

Medac also has successfully completed a third-party assessment of its controls and procedures required by the Health Insurance Portability and Accountability Act.