Risk Mitigation
In the heart of the city, Dr. Smith’s Dental Haven (name changed) was a bustling dental office renowned for its expert care. However, behind the scenes, a lax approach to HIPAA compliance was lurking like a time bomb. One fateful day, a cybersecurity breach exposed patient records to the dark web. The breach occurred due…
Read MoreA Common Scenario Once upon a time, there was a renowned civil engineering firm that excelled in constructing magnificent structures. Their expertise and meticulous attention to detail made them highly sought-after by clients worldwide. However, they underestimated the significance of having a disaster recovery plan specifically addressing cybersecurity risks. One day, hackers targeted the firm’s…
Read MoreIf you are a Mac user, you may have heard about the recent updates to MacOS Sonoma 14.4 and 14.1 that have been resetting user’s FileVault recovery keys. FileVault is a built-in encryption feature that protects your data from someone who might obtain physical access to your device. During this update, users are presented with…
Read MoreA Brief History On October 30, 2023, The Securities and Exchange Commission (SEC) filed a lawsuit against SolarWinds, the information technology firm that fell victim to a Russian-backed hacking group in a major cyber-espionage incident in 2019. The SEC alleges that SolarWinds committed fraud and failed to maintain adequate internal controls for several years leading…
Read MoreEvery generation of parents faces unique challenges in parenting as society advances and evolves. The upbringing in the 70s differed significantly from the 90s, and both seem vastly different from the present era. Listening to my father’s tales of his childhood feels like stepping into a different world altogether. In today’s digital age, with the…
Read MoreOverview According to one source, these are the most dangerous activities to engage in: Honestly, we wonder why bull running wasn’t first on the list! Managing risk is part of life. We all take risks every day, most likely not any of those listed above. But what most people are particularly bad at is defining…
Read MoreA Case Study: Southwestern Airlines December 2022 Bob Jordan, the CEO of Southwest Airlines, believed the business would swiftly rebound from the extreme cold that resulted in hundreds of flight cancellations throughout the country in the days before Christmas. But by Dec. 25, it became obvious that the airline’s operations were in full meltdown. After…
Read MoreIn the wake of the recent ransomware breach at Rackspace, many of their customers lost all access to their email accounts, calendars, and other critical information. The company responded by initiating emergency protocols. User accounts were migrated from Rackspace’s hosted Exchange to Microsoft’s O365 platform. Despite restoring services, users lost all their data due to…
Read MoreSeveral years ago my home was burglarized. That was not a happy day. During the insurance claim process, the adjuster required me to provide evidence of each stolen item along with it’s replacement value. In addition, they asked me to verify ownership of those items with receipts, precise descriptions, or photos. Fortunately, my phone and…
Read MoreThe Need for Management Information Systems Our Information Age appears to be entering a midlife crisis with many of us suffering from TMI… Yes, “too much information.” No, we’re not addressing that awkward issue of #peopletalktoomuch. As a technology company, we try to stay in our lane. Our focus is dealing with the vast amounts…
Read More