Who’s to blame for the Anthem hack?

Article by John D. Sutter Maybe you got the email, too? It landed in my inbox at 1:58 a.m. on Thursday. “To Our Members: Safeguarding your personal, financial and medical information is one of our top priorities, and because of that, we have state-of-the-art...

Cloud Safety: How to Stay Protected

You may have worked in the cloud if you’ve ever created and shared a homework document in Google Docs, been on a project team in Basecamp, or used customer relationship management software like Salesforce. Or maybe you regularly dump your photos into Flickr,...

Which Cloud Storage Services are HIPAA Compliant?

Article by Marlene M. Maheu, Ph.D. As computer hard drives are getting overloaded with information, behavioral professionals are beginning to wonder which companies to trust with their client/patient information. Many data storage companies have developed robust...

How to Tap Your Network and See Everything That Happens On It

Article by Alan Henry Your home network is your fortress. Inside it lies tons of valuable information—unencrypted files, personal, private data, and perhaps most importantly, computers that can be hijacked and used for any purpose. Let’s talk about how you can,...