Cybersecurity

Latest Posts from Our Blog

What is HIPAA compliance?

What is HIPAA compliance?

By SandStorm IT | March 26, 2024
Categories: , ,

What is HIPAA? HIPAA is the Health Insurance Portability and Accountability Act of 1996 that was enacted by Congress and signed into law in 1996.  There are many provisions to HIPAA covering many items mostly dealing with health insurance and regulations on what can be offered and how. Additionally, HIPAA also details regulations about a…

Read More
HTTPS

Strengthening Cybersecurity: The Importance of Multi-Factor Authentication

By Jeff Fowler | March 19, 2024
Categories: , ,

In today’s interconnected digital landscape, cybersecurity stands as a paramount concern for individuals and organizations alike. With cyber threats evolving at an unprecedented pace, traditional security measures alone are often insufficient to safeguard sensitive information and digital assets. In this regard, multi-factor authentication (MFA) emerges as a vital tool in fortifying defenses against unauthorized access…

Read More
Ransomware

Ransomware – What To Do If You Are Infected

By SandStorm IT | March 12, 2024
Categories: , , ,

Ransomware still remains one of the most notorious forms of malicious attacks out on the internet, and won’t be going away any time soon. It now takes very little effort for someone to make their own Ransomware variant, as evident by all the new strains popping up every day. With so many variations, what steps…

Read More
next-gen firewall

Why does my business need a next-gen firewall?

By Justin Oliver | March 5, 2024
Categories: , , , ,

We’ve previously covered “What is a Firewall and Why do I Need One?”.  In this blog post, we will take a deeper look to see how a Next Generation Firewall (NGFW) can help protect your business. NGFW’s contain all the tried and true features of the firewalls before them but they also contain advanced functionalities.…

Read More
Data Breach

Cyber Attack on health tech company causes interruptions at pharmacies across the U.S.

By Jeff Fowler | February 27, 2024
Categories: ,

In an era where technology seamlessly intertwines with healthcare, ensuring the security and reliability of digital systems is paramount. However, recent events have shaken the foundation of this symbiotic relationship. Change Healthcare, a prominent U.S. health tech company, found itself at the center of a storm as a series of cyber attacks disrupted operations in…

Read More
costs of cybersecurity breaches

5 Costs of Cybersecurity Breaches and How They Impact Your Business

By SandStorm IT | February 20, 2024
Categories: , , ,

Accounting for more than $12 billion in total business losses, the costs of cybersecurity breaches are impacting businesses’ bottom lines more often than ever. The cost of a single data breach averages $149K. With a price tag like that, it’s no surprise that some businesses close their doors after an attack, unable to recover from…

Read More
HOW TO AVOID PHISHING SCAMS

Phishing: How to Avoid Phishing Scams

By SandStorm IT | February 13, 2024
Categories: , ,

What is Phishing? This varies from the specific type of phishing, but in general, phishing is the act of tricking and manipulating a user to reveal information to the attacker through various means. Tools of the trade can range from malware laced documents, to websites with URLs that are spelled similarly to popular services that…

Read More
Windows 10 End of Life

Windows 10 End of Life (EOL) is October 14, 2025 – How can I prepare?

By Jeff Fowler | January 23, 2024
Categories: , , ,

With the impending End-of-Life (EOL) for Windows 10 set on October 14, 2025, users are preparing for the transition to the latest operating system, Windows 11. In this post, we’ll delve deeper into the reasons behind Windows 10’s EOL, what users can expect after the cutoff, and a glimpse into the anticipated Windows 12. Why…

Read More
SIM Swap Attack

What is a SIM Swap Attack and How can I Protect Myself?

By Jeff Fowler | November 28, 2023
Categories: ,

Even with the added layer of security of Two-Factor Authentication (2FA), cybercriminals are still finding ways to hack into accounts. How are they doing this? By basically taking control of a phone number, they are having the 2FA messages sent to a device on the phone number that they now control, thus getting around the…

Read More
endpoint Malware protection

Do I still need endpoint Malware protection?

By SandStorm IT | November 21, 2023
Categories: , , , , , ,

If you’ve used a computer anytime over the past 20 years, you’ve probably been infected by a virus, malware, or some other malicious piece of software.  You may have been lucky and been able to get it cleaned off without much trouble or maybe you weren’t so lucky and lost data.  Think about today, what…

Read More

Connect w/ Us:

Subscribe to Our Newsletter