|Autodesk||Carl Bass, President & CEO||Autodesk is a leader in 3D design, engineering and entertainment software. Since its introduction of AutoCAD software in 1982, Autodesk continues to develop the broadest portfolio of 3D software for global markets.|
|Smartronix||John Parris, CEO||Smartronix, Inc. is a highly reputable information technology and engineering solutions provide with core offerings focused around NetOps, Cyber Security, Cloud Computing, Enterprise Software, Health IT, and Mission-Focused Engineering.|
|Radware||Roy Zisapel, CEO & President||Radware is a global leader of application delivery and cyber security solutions for virtual, cloud and software defined data centers.|
|Lumen21||Eduardo Don Jr., President & CEO||Lumen21 helps build the right solutions based upon the client’s IT organization strengths and core competencies.|
|AppZero||Nigel Stokes, CEO||AppZero’s products and services provide a fast, flexible way to move server applications to a cloud or datacenter, without code change.|
|Genesis Network Group, LLC||Mark drizing, Partner||Genesis Network Group, LLC offers highly competent, dependable personalized IT support enabling you to focus on growing your business|
|Wowrack||Erward (Ed) Osckar, Managing Partner & Co-Founder||Founded in 2001, Wow Technologies, Inc. (Wowrack) is a cloud service provider; offering various Hosting services including Managed Hosting Solutions, Dedicated Server Solutions, Colacation, Virtualization, Bandwidth Delivery and Managed Services.|
|Burstorm||Brandon Abbey, CEO||Founded in 2009, Burstorm provides a platform to model, design and benchmark new and existing infrastructure with price-performance information from 100s of providers and 1000s of products|
|KAMIND IT Inc||Matt A. Katzer, President||KAMIND IT specializes in business solutions designed to solve your problems and allow business growth. It provides comprehensive IT strategic plans built around your businesses’ core values and goals managed solutions.|
|LaZerCAD, LLC||Michael Axon, Founder & CEO||LaZerCAD provides as-built surveying services with a unique client delivery via a “Cloud” based solution, the only On-Demand, Cloud Based delivery system in the market.|
Click here to reserve your spot: http://www2.lumen21.com/riskassesment-or-gap-analysis
After being involved in a relatively small data breach in 2013, when an unencrypted laptop with PHI data was stolen followed by the failure to properly inform potentially affected clients, The University of Mississippi Medical Center (UMMC) had to pay a $2.75 million penalty. Continue reading HHS Ramping Up HIPAA Penalties? How Can You Minimize The Chance of a Data Breach That Leads To a Multi-Mllion Dollar Penalty?
In a recent Article published by AT&T entitled “What every CEO needs to know about Cybersecurity,” a call to action is made of CEOs and board members for proactive engagement of their organization in adopting a more Risk-Driven Approach in light of the increasing cyber-security attacks in healthcare. Continue reading Leadership in Healthcare and Cyber-Security
Is it a HIPAA Risk Assessment or a Gap Analysis? And Why Does It Matter?
on Aug 5, 2016 10:00 AM PST at: http://www2.lumen21.com/riskassesment-or-gap-analysis
Ask any IT department what is required to comply with the HIPAA Security Rule, and you’ll likely hear things like data encryption, unique user IDs, and strong passwords. You might even hear about documented policies, anti-virus software, and removable media controls. But you are less likely to hear about the first required specification in the HIPAA Security Rule, a risk analysis. Continue reading HIPAA Risk Assessment or a Gap Analysis? And Why Does It Matter?
A recent 2016 Ponemon’s 2016 Cost of Data Breach Study: Global Analysis reveals the average total cost of a data breach for the 383 companies participating in the research increased from $3.79 million to $4 million. They found that the average global cost of data breach per every lost or stolen record is $158. Healthcare organizations, however, had an average cost of $355 per record, according to the new survey. Continue reading Adding a key component to your Arsenal of Defense against Data Breaches
In a recent article that appeared in Healthcare IT News, HyTrust, a company specializing in encryption for storage and virtual environments, conducted that found there was a rise in the percentage of Healthcare organizations planning on moving some of their applications to the cloud. Continue reading Increase Cloud Adoption Formula in Healthcare with greater Peace of Mind
With the rising number of scams in the digital world, the number of Tech Support Scam complaints reported to the Internet Crime Complaint Center (IC3), just between January 1, 2016 and April 30, 2016 reached 3,668.
A Tech Support Scam is when an attacker calls pretending to be a technical support person associated with a legitimate-sounding, but phony, third-party provider. These folks, called scammers, will try and convince you to give them remote access to your device using their social engineering skills. If the device is a phone or a tablet, the scammer will ask you to connect it to a desktop or a laptop. Once the scammer has remote control of your device, the scammer will claim to have found multiple viruses or scareware on the device and will tell you that it needs to be fixed immediately. The scammer will try and convince you to pay a fee with a personal check, debit/credit card or wire transfer the payment. Continue reading Tech Support Scams: A deceptive way to con people
During the 2012 LinkedIn data breach, about 6.5 million user account passwords were said to have been compromised, but the recent revelation of 117 million account passwords being compromised has sent a new wave of concern amongst LinkedIn users. Continue reading IDs for “Sale”: Is your LinkedIn account safe?
A fresh wave of spear phishing has hit the markets with a newly themed scam called “Secure Doc”.
Spear phishing is considered to be the most specific type of phishing attack, as it’s directly targeted at an individual or an organization. This form of phishing has become one of the most prevalent phishing techniques and has seen an exponential rise with the highest success rates. Continue reading Secure Document Phishing Attacks
The news continues to be filled with cases of ransomware and data breaches. C-level executives ask regularly about their organizations’ security, as well as their compliance posture. Continue reading Office 365+