The phishing craze that’s blindsiding users

The phishing craze that’s blindsiding users

Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam. Take a look at our advice […]

Why you need to back up your mobile devices

Why you need to back up your mobile devices

There was a time when mobile phones were used exclusively for calling and texting. Now, they can do so much more. Regardless of your level of tolerance or skill for managing documents in such a small gadget, mobile devices allow you to send and receive email, download and upload media files, store data, and even […]

An essential checklist for WordPress users

An essential checklist for WordPress users

Wake up. Take a shower. Get dressed. These are just some of the numerous tasks we do every single day. They may not be fun, but they are essential to our daily routine. Managing a website is very much the same. By going through the necessary steps, you can ensure the speed and security of […]

Content Critical completes SOC 2 Type 2 and HIPAA assessment; Designations are becoming “critical requirements” for data managers

MOONACHIE, N.J., April 17, 2017 (GLOBE NEWSWIRE) -- Content Critical Solutions, a leading provider of mission-critical business communications services, announces completion of a third party audit attesting to its achievement of the demanding requirements of the SOC 2 Type 2 and HIPAA data security standards.

Graphcom Inc. completes SOC 2 Type 1 and HIPAA assessments; Designations provide assurance of IT and data security compliance

GETTYSBURG, Pa., April 13, 2017 (GLOBE NEWSWIRE) -- Graphcom Inc., a full-service communications, branding, marketing and healthcare analytics firm, announces completion of a third party audit attesting to its achievement of the data security requirements of the Service Organization Controls (SOC 2) Type 1 and the Health Insurance Portability and Accountability Act (HIPAA).

The rigorous examinations were administered by the professional IT assurance and compliance staff at 360 Advanced, a respected national Qualified Security Assessor, HITRUST CSF Assessor and CPA firm based in St. Petersburg, FL. 360 Advanced has clients in 30 U.S. states, Europe, South and Central America and the Pacific Rim.

Is the government really spying on you?

Is the government really spying on you?

Wikileaks, the website that anonymously publishes leaked information, recently released a number of documents alleging widespread surveillance by the US government. The released documents claim that the vast majority of these efforts took place via smartphones, messaging apps and…TVs? Let’s see just how worrisome they really are. What devices and apps are supposedly vulnerable? Wikileaks […]