Four Winds Forecast

Hot Topics, Trends, and Everything Else IT

Data Privacy and Security Reform: We’re Next

[fa icon="calendar'] May 31, 2019 / by Communications posted in Cyber Security, Compliance

Compliance is Coming for US... Businesses

Since the advent of the internet, the storage and use of private data has been as cavalier as the Wild West. Businesses have been free to collect any data they can get their hands on, build massive customer databases, and then manipulate or even sell the information for their benefit.

Read More [fa icon="long-arrow-right"]

HIPAA and You: A Compliance Conundrum

[fa icon="calendar'] May 1, 2019 / by Communications posted in Compliance, Virtual CIO

 

SO, What is a HIPAA?

If you aren’t in the healthcare industry (or in some cases even if you are, YIKES!) you might have only heard the term HIPAA in passing. The thing is, HIPAA now covers plenty of businesses outside of the healthcare industry due to the addition of the Omnibus Rule in 2009, and there is a severe lack of knowledge in terms of HIPAA requirements and how it can affect business. [1]

We will explore which businesses need to be concerned with HIPAA, some of the requirements if you do fall under the scope, and, why it all matters to your business. As with anything, it is important to first get an idea of what HIPAA is and where it came from before we can truly understand why it’s important, so, without further ado let’s dive in.
Read More [fa icon="long-arrow-right"]

Malware, Hacking, and Phishing, Oh My!

[fa icon="calendar'] April 17, 2019 / by Communications posted in IT Roadmap, Cyber Security


Something SMells Phishy...

You’re at your desk Monday morning sipping your coffee and sifting through your emails from the weekend when one in particular catches your eye. It’s from Steve, a business partner of 15 years, and, in his email he lets you know that they recently switched banks and will have a new routing number for payments going forward. He provides all the information and tells you to call if you have any questions. You go ahead and update your system with the new information and go on with your day.

Read More [fa icon="long-arrow-right"]

Marriott Database Debacle: A Cautionary Tale

[fa icon="calendar'] April 1, 2019 / by Communications posted in IT Roadmap, Cyber Security

Historic Breach

Remember the story of the Trojan Horse? The Trojans and Greeks had reached a standstill in their war because the walls around the city of Troy could not be breached. One day, the Trojans woke up to find that the Greeks had fled in the middle of the night, leaving behind a wooden horse as a gift. Happy to finally be finished with the war, the Trojans eagerly carried the horse inside their city walls. That very night Greek soldiers sprung from the horse and destroyed the city from the inside and the rest is, as they say, history.

Read More [fa icon="long-arrow-right"]

October is Cyber Security Awareness Month

[fa icon="calendar'] October 15, 2018 / by Communications posted in Tech Tips, Cyber Security

Educate your employees so that your company does not become one of the statistics below:

Read More [fa icon="long-arrow-right"]

Instant Business Continuity Even When Internet is Down: The Magic of Automatic Cellular Failover

[fa icon="calendar'] July 31, 2018 / by Communications posted in Cloud Solutions, Disaster Preparedness

 

Read More [fa icon="long-arrow-right"]