Computer Networking Blog

How Phishers Are Using Encrypted Sites to Scam You

How Phishers Are Using Encrypted Sites to Scam You

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. 

5 Ransomware Statistics Every Business Owner Needs to Know

5 Ransomware Statistics Every Business Owner Needs to Know

While ransomware statistics in 2017 were alarming in terms of growth and severity of attacks, the cybersecurity industry has made great strides in defending against them. But despite our best efforts, the threat shows no signs of going away.

4 Cyber Security Predictions for 2018

4 Cyber Security Predictions for 2018

If 2017 has shown us anything, it’s that even major organizations can come to a grinding halt due to cyber security attacks.

This message probably won’t come as a surprise to many businesses.  After all, several big-name brands have suffered embarrassing data breaches in recent years, causing significant financial and reputational damage.

3 Simple Steps to Make Sure Your Law Firm is HIPAA-Compliant

3 Simple Steps to Make Sure Your Law Firm is HIPAA-Compliant

If any of your clients are involved with health care, you know how highly regulated the field is.  You may think you are complying with all the regulations and have lock-tight security measures in place at your law firm.  But you could be wrong.

Thirty-two percent of breaches in recent years were caused by IT incidents or hacking.

Tips to Maintain ePHI Security on Mobile Devices

Tips to Maintain ePHI Security on Mobile Devices

More organizations are utilizing smart phones, laptops and tablets for daily operations but failing to include these devices in a company-wide risk analysis could lead to mobile device security issues.

Entities need to maintain ePHI security and understanding the potential risks associated with mobile devices is a key part of that, which the OCR stressed in its recent cybersecurity newsletter.

5 Deadly Mistakes You Are Making With IT Security

5 Deadly Mistakes You Are Making With IT Security

In the world of IT security, hackers are always busy circumventing various cyber defenses and security companies are always found racing to react to these emerging cyber threats.  This is just simply part of today’s business world but there are steps you can take to help keep your company data safer and knowing which mistakes to avoid is the key.

7 Reasons Why You Need an IT Team to Crush Your Competition

7 Reasons Why You Need an IT Team to Crush Your Competition

Delegating responsibilities can be a challenge for today’s business owner but an IT team is a needed asset for small businesses.

BIS CEO Earns the Certified Information Systems Security Professional Designation (CISSP)

BIS CEO Earns the Certified Information Systems Security Professional Designation (CISSP)

BUSINESS INFORMATION SOLUTIONS, INC. FOUNDER AND CEO PHILLIP LONG EARNS THE CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP) DESIGNATION

ROBERTSDALE, Alabama (DATE TBD) - Phillip Long, founder and CEO of BIS Technology Group and owner of Business Information Solutions, Inc.

19 Reasons Your Website Needs Updating (4 part series)

19 Reasons Your Website Needs Updating (4 part series)

4 Part Series Reveals 19 Reasons Your Website Needs Updating (part 1 of 4)

Is your website establishing and building trust with your prospective customers?
Your website is a storefront for your business. Your website is most likely the first thing your customer sees.