Hackers Want to Hack Your Phone
Short on time? Check out our infographic that sums it all up here. Take a second to open a new tab and Google “cell phone hacking”. What do most of…
Short on time? Check out our infographic that sums it all up here. Take a second to open a new tab and Google “cell phone hacking”. What do most of…
If you clicked to read this blog post, chances are you are already familiar with PCI compliance and what it entails; but as a refresher from another one of our…
Hackers target attorneys. According to the National Law Review, “As more and more clients send cyber due-diligence questionnaires to outside counsel to confirm that their sensitive information is secure, law…
The Healthcare Insurance Portability and Accountability Act (HIPAA) was signed into law over 20 years ago. The Health Information Technology for Economic and Clinical Health Act (HITECH) was created in…
Leave IT to the pros. With managed services from ADKtechs, we’ll help take some work off your plate so you can stop worrying about IT and start having more time…
Technical assessments can save your business: Assessments are important. You can’t fix a problem if you don’t know it exists. Once you’re aware of issues, it’s much easier to develop…
The basics Section 13402(e)(4) of the HITECH Act requires that all healthcare breaches impacting 500 or more individuals must be posted by the Secretary. We visited the US Department of Health…