Entries by Randall Brinks

Data Security Key to Staying HIPAA Compliant

The Health Insurance Portability and Accountability Act is a regulation passed by the US congress in 1996 to help streamline the healthcare system while maintaining individual ePI privacy over individuals’ […]

How Will the Regulations Surrounding the Cloud Continue Shifting?

Cloud computing is a major growth industry as businesses and individuals look to use the computing strategy to either save money or get resources that they would typically not be […]

What Software Does Your Business Need?

Every business depends on some type of software, but some businesses seem to have an application for every single thing and it can be too much for employees or administrators […]

Bureaucracy In Your Business Can Ruin Efficiency

For business managers, it can sometimes be difficult to create policies and procedures that allow for the efficiency that they’d like to see from their business. Business growth leads to […]

Is Your Team Becoming Desensitized to Your Business’ Cybersecurity Precautions?

Password changes, multi-factor authentication, and countless changes in policy and procedure can make daily workflows more and more complicated. Cybersecurity can truly be a pain—a necessary pain, granted—but a pain […]

What Your Organization Needs to Know About the FTC Safeguard Rule

The Federal Trade Commission, or FTC, has put together a Safeguard Rule to help establish guidelines for how businesses store and interact with customer information. Enacted in 2003, this rule […]

Don’t Be So Quick to Scan Every QR Code You See

There is no denying that Quick Response codes—better known as QR codes—are a handy little invention. Just a few years ago, many businesses heavily adopted these contactless communication tools, allowing […]

Is Remote Work Really That Much Greener, In the Long Run?

One of the biggest arguments for remote work is that it poses environmental benefits, but how much truth is there to this statement? Today, we want to dive into the […]

Are You Being Phished? 4 Things to Look Out For

Your business’ computing infrastructure is a pretty resilient system. It has all types of tools added on to keep malicious code, bad actors, and even sabotage from ruining the good […]

How Schofield’s Laws of Computing Can Benefit Your Business’ Security

There are quite a few platitudes that we support, in terms of business IT. Some that we haven’t really touched on, however, are Schofield’s Laws of Computing. Let’s fix that […]