FOUR WINDS BLOG

The latest in technology resources and news.

HIPAA and You: A Compliance Conundrum

Posted May 1, 2019 by Communications

 

SO, What is a HIPAA?

If you aren’t in the healthcare industry (or in some cases even if you are, YIKES!) you might have only heard the term HIPAA in passing. The thing is, HIPAA now covers plenty of businesses outside of the healthcare industry due to the addition of the Omnibus Rule in 2009, and...

filed under: Managed Services, HIPAA, Compliance

Malware, Hacking, and Phishing, Oh My!

Posted April 17, 2019 by Communications

Something SMells Phishy...

You’re at your desk Monday morning sipping your coffee and sifting through your emails from the weekend when one in particular catches your eye. It’s from Steve, a business partner of 15 years, and, in his email he lets you know that they recently switched banks and...

filed under: IT Roadmap, Network Security, Cyber Threats

Marriott Database Debacle: A Cautionary Tale

Posted April 1, 2019 by Communications

Historic Breach

Remember the story of the Trojan Horse? The Trojans and Greeks had reached a standstill in their war because the walls around the city of Troy could not be breached. One day, the Trojans woke up to find that the Greeks had fled in the middle of the night, leaving behind a wooden...

filed under: IT Roadmap, Cybersecurity, Network Security

Do you have a Scary IT Story?

Posted October 30, 2018 by Communications

IT horror stories are perfect for Halloween and Cybersecurity Awareness month.  If you are the owner of a company or in the IT field, you all have your own similar scary tales to tell. 

1.    In the early '90's, an IT engineer was finishing up a marathon weekend roll-out. Final testing had been...

October is Cyber Security Awareness Month

Posted October 15, 2018 by Communications

Educate your employees so that your company does not become one of the statistics below:

  1.  Up from three trillion a year ago, cyber-crime damages will cost the world $6 trillion annually by the year 2021.
  2.  Each year, one in three Americans is affected by hacker attacks that occur every 39 seconds.

filed under: IT security

What is Your Logo Story?

Posted October 11, 2018 by Maureen Borden

Creating your company logo can be a daunting (but exciting!) task.  This small piece of art must incorporate some symbolism of what your company does, and, once created, will then be permanently linked to your company name and brand. No pressure there! We would love to hear your ‘logo story’.

When...

Instant business continuity when your internet is down: Internet backup using automatic cellular failover.

Posted July 31, 2018 by Communications

 

It is vital to your business that your company keeps running during a temporary internet outage, or, a natural disaster. The ability to keep ‘business as usual’ takes on a new level of urgency when that business is dependent on a reliable internet connection. If that connection is interrupted...

filed under: local I.T. Support, Hurricane preparedness, Business continuity, Redundant internet circuit, Internet backup, Cellular internet failover

Security Alert: Your Website Might Display This Warning Starting July 2018

Posted June 28, 2018 by Communications

 

In July 2018, Google will release Chrome 68. Unlike prior releases of Chrome web browsers, this version can significantly affect your website traffic and possibly affect your company’s reputation.

Chrome 68 will include a security check to detect whether your website is encrypted. If it is not,...

Hurricane preparedness for business

Posted June 11, 2018 by Communications

On May 31st in the office, it is business as usual, but, June 1st strikes and it’s DEFCON 1 for the entire company. It’s hurricane season – is your business prepared? There are many similarities between preparing your home and family and preparing your office and employees. Here are steps to help...

Ransomware Attacks are Inevitable, Being Vulnerable Doesn’t Have to Be

Posted May 29, 2018 by Communications

 

It cannot be said enough – back up your company’s most valuable data, have solid DRP and BSC plans in place and train your employees to recognize and neutralize cybersecurity threats. Do not allow your company to be held hostage by ransomware. Cybercriminals start by encrypting all the files on...

filed under: IT security, Cloud and Local Backup Solutions