Blog

Email Verification and a Lesson in Cybersecurity

Recently, we added a new component to our employee benefits, establishing a relationship with a new vendor along the way. As most new vendors do, this company sent a contract for approval and a signature via an email link to ...

Military to Healthcare: Leadership, Adaptability & Cybersecurity

Ken Ryesdorph's journey from the Marines to a successful healthcare business exit offers valuable lessons in leadership, adaptability, and the critical role of cybersecurity in today's landscape. With a background spanning military service, sales, and executive roles in startups and ...

Ron’s Presentation on HIPAA and Cybersecurity at 2024 Healthcare Leaders Association Winter Conference

Are you HIPAA Compliant or HIPAA Complacent? Learn how to avoid ransomware, cybercrime, fines under the False Claims Act (5x annual Medicare reimbursement!), and Class Action lawsuits. This was delivered at the 2024 Winter Conference of the Alabama Healthcare Leaders ...

Penetration Testing 101: The Essential Tool for Proactive Cybersecurity

What if a trusted third party could help your company identify specific vulnerabilities before the hackers do? Cyberattack stories abound, from large corporations like Target and Equifax to various small businesses in your hometown, and the productivity and revenue loss ...

'Twas The Night Before Hackedmas

Security and IoT

Three days before Thanksgiving, your refrigerator stops working.  A short discussion with your trusted appliance repairman convinces you that it’s time for a replacement.  Resigned, you head to your local big box store to compare available options. Every refrigerator you ...

Eight Ways Cybercriminals are Using Artificial Intelligence

In the waning days of Q3 2023, Johnson Controls International, the industrial control systems manufacturer, has become the most recent victim of a large ransomware attack. With disrupted operations and IT outages, the initial investigation has only just begun, and ...

Cybersecurity and Patient Rights

In July 2019, Springhill Medical Center in Mobile, AL, suffered an eight-day ransomware attack that left medical equipment and patient records largely inaccessible. During this attack on July 17, Teiranni Kidd gave birth to her daughter, Nicko Silar.  A reduced ...

The NEW Threat to Your Business Email Account

In April 2019, hackers successfully infiltrated the email accounts of several staff members at St. Ambrose Catholic Parish in Ohio. Through email communication between church leaders and their construction firm, the hackers learned details about the recent restoration and repair ...

Walk-Ins Welcome Podcast Return

Our President/CEO, Ron Shoe, returns to the Walk-Ins Welcome podcast, this time to discuss security in healthcare settings. Ron discusses how your vendors can put you at risk, and he outlines some of the potential dangers of Electronic Medical Records ...