VC3
Filter by
Blog
|
6 min read
Building the Right IT Strategy to Comply with HIPAA's Technical Safeguards
This year is the Health Insurance Portability and Accountability Acts (HIPAA) 25th anniversary. Its probably not an an...
Read More
Blog
|
5 min read
10 Things to Focus On for a Successful Backup
March 31st is World Backup Day and the perfect time to explore the importance of data backup. Data backup is one of the ...
Read More
Blog
|
6 Min Read
14 Cybersecurity Myths and Misconceptions
Common cybersecurity myths needing to be debunked to ensure you're properly approaching and reducing your risk around cy...
Read More
Blog
|
4 min read
The Technology Foundation You Need for Body-Worn Recording Laws
Recently, the Act Concerning Police Accountability became law in the State of Connecticut. Since then, police department...
Read More
Blog
|
3 min read
Critical Microsoft Exchange Vulnerability Illustrates Importance of Cyber T...
Last Wednesday, the Cybersecurity and Infrastructure Security Agency (CISA), a federal agency overseen by the Department...
Read More
Blog
|
2 min read
Water Supply Attack Illustrates Security Lessons for Municipalities
During the first week of February in Oldsmar, Florida, a hacker tried to poison the city's water supply by increasing th...
Read More