Resources and Information

Recent Articles

RockYou2024: The Largest Password Compilation Leak and Its Implications for Lexington Healthcare Organizations IT compliance

RockYou2024: The Largest Password Compilation Leak and Its Implications for Lexington Healthcare Organizations

In today’s digital landscape, cybersecurity breaches have become a significant threat, especially for healthcare organizations. As the owner of an IT services company, iSAFE Complete Managed Services, based in Lexington, Kentucky, I understand the challenges faced by healthcare providers in meeting HIPAA compliance requirements while managing costs. The RockYou2024 Password

Read More »
The Dell Portal Breach: What Happened? HIPAA Compliance

The Dell Portal Breach: What Happened?

Dell, a renowned name in the technology industry, recently disclosed a breach in its customer portal. This breach exposed sensitive data, including customer names, email addresses, and in some cases, hashed passwords. While Dell acted swiftly to address the issue and secure the affected systems, the incident serves as a

Read More »
VPNs Aren’t All They’re Cracked Up to Be. Here’s Why. IT Support

VPNs Aren’t All They’re Cracked Up to Be. Here’s Why.

If you’ve been watching videos on YouTube or any of the popular streaming services lately (let’s be honest– who hasn’t?), then you’ve probably seen an ad or two trying to sell you a virtual private network (VPN). Consumer VPN companies like NordVPN, ExpressVPN, and others like them may have you

Read More »
Hierarchy of IT Security IT Support

Hierarchy of IT Security

When thinking about IT Security, the list of management tasks can be overwhelming.  We’ve put together a simple list of protections that should be included in every cybersecurity plan.   Managed IT Services A quality managed service provider will assume responsibility for the security of the network infrastructure.  Unlimited support almost

Read More »
Hierarchy of IT Security IT Compliance

The Smart Way to Handle Smart Devices

Smartphones, smart appliances, smart homes … Is there anything that isn’t smart? Well, it turns out that relying on smart devices isn’t always that smart. The Internet of Things, or IoT, is the new frontier in networking. Smart devices have internet capability, enabling them to network with computers, phones and

Read More »
Hierarchy of IT Security

Your Data is Valuable — Protect It

Thieves coming after your money is easy to understand. But why would someone target your data?  Many people don’t think of protecting data such as their email address, phone number or personal ID number. But these simple pieces of information are often valuable targets for attackers. All forms of data

Read More »
Hierarchy of IT Security IT Compliance

Social Engineering — And All Its Moving Parts

Sometimes, the most powerful tool is a word. Social engineers know that, and they use that tool to bypass all of the automatic protections and preplanned procedures you have in place. A persuasive lie can get an attacker further than a dozen hacking tricks. Fighting social engineering is all about

Read More »

SEARCH ARTICLES

FREE REPORT

Image representing the Managed IT services Buyers guide free download

The Kentucky Business Guide To IT Support Services And Compliance

What You Should Expect To Pay For IT Support For Your Small Business (And How To Get Exactly What You Need Without Unnecessary Extras, Hidden Fees And Bloated Contracts)