fbpx

Blog

Powered by the team at Connectria

 
Coronavirus and Connectria’s Pandemic Policy
The coronavirus (medical name COVID-19) has been all over the news, with an impact not only on public health and travel, but on commerce as…
 
Passwords and Users with Superpowers: Two Common Security Risks and What to Do About Them in IBM i
In our previous post about HelpSystems’ annual State of IBM i Security study, we recapped one key theme the report unearths every year. The highest…
 
Protecting Your Healthcare Data Against Unauthorized Access/Disclosure
As reported by the HIPAA Journal, October 2019 was the worst month for healthcare data breaches on record, with a total of 52 incidents reported.…
 
IBM i Security Issues Aren’t Technical: They’re Cultural
For the past 16 years, IT firm HelpSystems has published a yearly “state of IBM i” security study. Year after year, the report uncovers consistent…
 
Identifying & Overcoming Security Challenges in the Cloud
Unless your organization has been completely heads-down and not paying attention for the past couple of years or so, you’re probably aware that cloud computing…
 
9 Surprising Business Activities Affected by HIPAA Compliance
Are You in Violation Without Knowing It? Is your organization affected by HIPAA compliance rules? Are you worrying about HIPAA violations? The answer should be…
 
Who Does HIPAA Protect? And What Does This Mean for Your IT Team?
Many experts are eager to point out the what and the how of HIPAA compliance: What protected health information (PHI) is included, how it needs…
 
Small Businesses & PCI – What You Need to Know
Running a business in today’s digital-laden and data-driven world requires compliance with various federal regulations. Depending on the industry and the type of data that…
 
Digital Transformation 2020: Preparing for the New Year in Cloud Tech
Every major calendar-year event comes with its own set of concerns for IT. For example, Black Friday and Cyber Monday put stress on eCommerce sites…
 
Know Your Audit Reports! More Advice on Vetting Cloud Providers
In a recent post, we discussed four ways to vet a cloud provider before trusting them with your mission-critical workloads. If you missed that post,…
 
What Should You Look for in a Hosting Provider?
Physical Security is a Must-Have Trusting your systems and data to a third-party provider can be a risky business. Of course, many data center operators…
 
Your Crash Course on Security in the Cloud (and of the Cloud)
You’ve no doubt realized by now that cybercrime isn’t going away anytime soon. What you might not know is that approximately 43 percent of all…
 
The Real Costs of Ransomware
It seems like it’s been a while since ransomware has been in the IT security news headlines. Certainly, 2019 hasn’t seen anything rivaling WannaCry and…
 
Is the IT Skills Shortage Jeopardizing Your IT Security and Compliance?
There’s no doubt that digital transformation can help make an organization more competitive. Technology lets us do things faster, better, and cheaper than our competition.…
 
Top Cloud Computing Security Issues and Challenges, and How IBM i Meets Them
There’s no doubt that cybersecurity has become the #1 challenge faced by IT departments today. And, with more and more companies moving workloads to the…
 
6 Bad IT Security Habits You Need to Kick in 2019
As I write this, it’s early March, and the wind is howling outside my window. We’ve just had several days of subzero weather. Caught in…

Subscribe to our Blog!