• Home
  • About Us
  • Contact Us
  • Home
  • About Us
  • Contact Us
Your HIPAA Guide
Skip to content
  • Home
  • About Us
  • Contact Us

7 Common Types of Identity Theft

Identity Theft   
medical identity theft

Medical Identity Theft – What is it and Should You Worry?

Identity theft is one of the most common forms of cybercrime. We hear it in the news such as when celebrities have their Twitter accounts taken over. What we usually… Read more »

Identity Theft   

7 Ways To Spot A Phishing Email

Phishing   

What is Malware? Ransomware? Do We Still Say Virus?

Malware, ransomware, trojans, rootkits, and viruses. You may have heard some or all of these terms. But what do they mean? What is malware? In this article, we will discuss… Read more »

Computer Security, Ransomware   

7 Common HIPAA Violations

HIPAA Compliance   

Vaccinate Your Practice to COVID-19 Scams

With COVID-19 sweeping the planet, we have all had to change how we live our lives. This has created many new challenges to the way we work. Many practices have… Read more »

Computer Security, HIPAA Compliance, Network Security, Phishing, Ransomware   

Top COVID-19 Phishing Email Examples

Computer Security, HIPAA Compliance, Identity Theft, Phishing, Ransomware   

Using Two-Factor Authentication Stops 99.9% of Account Compromises

Microsoft released a report that stated, from their research, 99.9% of all account compromises could be prevented by using multi-factor authentication. The report detailed that about 1.2 million accounts worldwide… Read more »

Computer Security, Network Security, Quick Wins   

You’ve Been Hit with Ransomware, Here is How to Recover

One of your employees comes to you and says there is a funny message on your computer. You make your way to the computer in question to find a message… Read more »

HIPAA Compliance, Ransomware   

Ransomware Attacks on Small Businesses Can be Devastating

Right before Christmas 2019, Arkansas based telemarketing firm, The Heritage Group, announced it was closing the company down. Earlier, in October, the company suffered a ransomware attack that crippled the… Read more »

Ransomware   
« Previous 1 2 3 4 … 13 Next »

Recent Posts

  • 5 Things You Should Be Encrypting
  • 5 Reasons You Need A Firewall
  • 5 Reasons Why You Must Patch Your Computer and Devices
  • 5 Reasons Why Your Company Should Be Concerned About Foreign Hackers
  • 5 Ways To Know If A Website is a Scam or Fake

Categories

  • BDR
  • Business Associates
  • Cartoons
  • Case Studies
  • Computer Security
  • Display
  • HIPAA Compliance
  • HIPAA Training
  • HIPAA Violations
  • Identity Theft
  • IT Services
  • Network Security
  • Phishing
  • Quick Wins
  • Ransomware
  • Risk Assessment

Learn how to protect your practice now!


Copyright © 2019 Iron Comet Consulting, Inc.
>

.

. .

.

Thank you for submitting form..!