How Business Phishing Scams Work (And How To Avoid Them)

phishing scams
Modern technology has opened us up to some new and daunting scams. Phishing scams are a regular occurrence that people must be aware of, otherwise they may fall prey to a scammer’s tactics. How Do They Work? Phishing scams most often manifest themselves via email.Some other ways phish
Continue Reading ?

3 Steps to Proper Patient Health Information Shredding

Health Information Shredding
There are many ways to protect patient privacy and shredding health information documents is one of the primary ways you can do this at your facility. Taking the steps below while also following applicable laws will keep your patient health information private. Your patients trust tha
Continue Reading ?

Identity Theft: the Real Business Risks

Business Identity Theft
Do you have secure information in those business files? When asked whether they need a written secure destruction policy to protect both their business and client information, most business owners might say “No, we handle our processes internally.” The truth is, most people just don’t
Continue Reading ?

3 New Ways Companies Are At Risk For Security Breaches

Security Breaches
New technologies mean new conveniences and new risks. People give up more information to companies who ask for it without a second thought, but those companies that people give information to may be at risk to have it stolen through a security breach.Being aware of these risks can hel
Continue Reading ?

How Legal Compliance Can Affect Business Security

Business Security
If you need more reason to be legally compliant when it comes to your business security, look no further. There are guidelines and laws everywhere you look on how to handle sensitive business information and the reason is simple – it’s very easy for criminals to steal identities
Continue Reading ?

Hard Drive Destruction : How To Do It Properly

Hard Drive Destruction
In the digital age, we often forget about the personal and professionally sensitive information we save to hard drives. Hard Drive Destruction is on the top of the list of importance in data security. There are many reasons a hard drive would need to be destroyed. Most commonly, a com
Continue Reading ?

How to Avoid Tax Return Fraud

Avoid Tax Return Fraud
It happens every year. Honest, hardworking taxpayers spend months gathering up their paperwork and estimating their tax liability. They tax their stack of papers to their trusted tax preparer, only to receive the bad news that someone has already claimed their refund. Tax return fraud
Continue Reading ?

Tips for Avoiding Medical ID Theft

An unguarded credit or debit card is not the only method identity thieves use to steal your personal information and take over your life. A growing number of identity theft cases arise not from retailers but from medical offices. If you are visiting a new medical clinic for the first
Continue Reading ?

Biggest Risk For Information Theft in Alaska

information theft
Your employees are your front-line in protection against information theft, but they might also be your biggest risk. There are many ways to keep your information safe and it all starts with your employees and how they handle information. Information Storage Depending on how your file
Continue Reading ?

Is Your Health Care Facility Following Paper Shredding Protocol?

Your patients put their trust, and identities, in your hands. Shredding patient paperwork that is no longer needed for their files is a crucial part of keeping your patient’s safe. Part of HIPPA requires medical records be destroyed thoroughly, following standard methods and procedure
Continue Reading ?