Talk to a Security Expert Now: (800) 721-9177

IT Security Blog

Independent research and articles on IT security, healthcare security, and hacking techniques.

Contact Us

HackedIn

In June 2012, a hacker posted 8 million “hashed” passwords on an underground forum, looking for assistance in cracking them. About a fifth of the user credentials appeared to have come from eHarmony.com, an online dating site, with the remainder…

Read More

FBI vs. Apple

Syed Rizwan Farook’s iPhone 5C Since the San Bernardino shooting, there has been a lot of information and news stories about Apple “refusing” to help the FBI by building software to crack the encryption – what has been referred to as…

Read More

Healthcare Information Security/Management is More Than Just HIPAA Compliance

Data security and HIPAA compliance at healthcare organizations around the nation have traditionally focused on one thing: protecting systems that contain and/or process patient information. Today’s headlines continually focus on security breaches that consist solely of patient information losses. Recently…

Read More