Big businesses are currently using artificial intelligence (AI) for many purposes such as customer service. Amazon uses machine learning to identify relationships between items in its catalog and determine its customers’ preferences. Apple’s Siri is…
Hot Tech Products for the Holidays
The holiday season is approaching quickly, so technology companies are busy releasing their latest products. The most popular high tech products this year will certainly include electronic entertainment, especially music and video. Apple is always…
Why CSCi is the BEST fit for your IT compliance project
Contractors that do business with the federal government generally must follow the security guidelines outlined in Special Publication (SP) 800-171, which is published by the National Institute of Standards and Technology (NIST). SP 800-171 also…
Three Tips for Securing Mobile Devices for Small Business
Top 3 Tips for Securing Mobile Devices for Small Business A business’s IT security issues have traditionally been confined to a business’s physical location, but the proliferation of mobile devices in the workplace has changed…
Understanding NIST Compliance in 2018
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandates national standards for electronic transactions of health information in the United States. The National Institute of Standards and Technology (NIST) published Special Publication (SP)…
Ignorance is Bliss… Until You’re Hacked!
More businesses are beginning to realize their vulnerability to cyber-attacks as headlines fill with stories of data breaches. The dropping costs of storage and managed software solutions has resulted in even small companies storing large…
Top Tips on Securing the Cloud
Business applications and services are moving to the cloud at a rapid pace, which makes the security of IT infrastructure a challenging business requirement. Once an organization no longer has physical control over its infrastructure,…
Understanding Microsoft Exchange Plans
Microsoft Exchange Online is a cloud-based service that provides businesses with a solution for calendar, email and contacts. It uses the same technology as Exchange Server and provides its users with a unified experience across…
15 Best Small Business Blogs to Follow About IT Security
Small business owners should include daily blog reading as an essential activity, since it is an effective method of remaining informed on current trends in their industry. This is especially true in IT security because…
Small Business Spotlight – HIPAA Case Study
Background A San Diego company that specializes in healthcare consulting for the patients of a large healthcare insurance corporation needed to establish a local presence with specific healthcare compliance requirements. Due to expansion of its…