Addressing the Insider Threat

Technology is a powerful tool in assuring the confidentiality, availability and integrity of your critical data – but it is no failsafe. Even the best of breed technology deployed in a layer approach (defense in depth) will have flaws. The most well meaning and resourced… Continue reading

Protecting Against Malicious USB

If you found a random USB device what would you do with it? Would you be curious and plug it into your computer to find what juicy secrets it holds? Or would you leave it where you found it? Most often, unsuspecting, ill-informed users take… Continue reading

Average Cost of Data Breach Increases to $4M in 2016

Data breaches are no joke, they bring real risks & serious quantifiable costs. A data breach is a security incident in which sensitive or confidential information is copied, transmitted or stolen by an unauthorized party. This data can be anything from credit card records, PHI… Continue reading

The HIPAA Audits are Coming

The HHS Office for Civil Rights (OCR) is gearing up for random audits of healthcare providers and partners. OCR is starting its 2nd phase of its ongoing audit program of CEs (Covered Entities), BA (Business Associates) in 2016. You may recall that HHS’ Office for… Continue reading

Defending Your Company From Ransomware

A recent high profile ransomware attacks at Ho11ywood Presbyterian has lessons for organization in healthcare and elsewhere. This organization is but one of the hundreds of thousands that have fallen victim to this type of malware. Ransomware is a particularly pernicious type of malware that… Continue reading

Protect Your Company from Phishing

Phishing attacks are a constant threat to organizations small and large. This post will explore some basic tips (technology and process) to keep you and your business safe in the face of this seemingly endless threat. According to the APWG (Anti-Phishing Working Group), The number… Continue reading

Why Network Monitoring

Would you ever drive blindfolded? Most assuredly not. Unfortunately, many IT organizations are effectively doing this on a daily basis by not implementing network monitoring. Alas most networks are careening towards disaster without even knowing it. IT Networks gain much from monitoring their networks that… Continue reading

Evolutionary IT Gives Back 2015

At Evolutionary IT we believe in corporate social responsibility. As always, we hold the primary charter of providing the best of breed IT solutions to our customers – but we acknowledge the need of our business to give back to the community and world which… Continue reading

PCI Compliance and PoS Security

If you run a business that processes credit card payments you know the difficulties of PCI compliance. Payment Card Industry Data Security Standard (PCI DSS) is a security standard that applies to any organization that accepts, process or store credit card data.  The PCI Standard… Continue reading

HIPAA, HITECH, PCI Compliance Failures

Many businesses hold inaccurate assumptions on achieving and maintaining compliance in the face of complex regulations in their industry. Primarily, they assume compliance is a one time project rather than an ongoing process. Most often it is something they completed several years ago by using… Continue reading