By:
Jada Sterling, Digital Content Manager
October 18th, 2023
AI is currently a hot buzzword in the tech industry, and for good reason. It can provide astounding productivity and precision in your note-taking, correspondence, content creation and more. However, cybercriminals are finding new ways to use AI to develop sophisticated scams and ransomware schemes. Here are the basics of AI and how it can threaten your business’s cybersecurity.
Managed Print | Cyber Security | printer security
By:
Jada Sterling, Digital Content Manager
October 13th, 2023
If you’re trying to improve your cybersecurity strategy, ensure you don't overlook your printers. They're often glossed over when business leaders address cybersecurity. This makes them attractive targets for cybercriminals. Businesses should consider printers a vulnerable endpoint of their business network. If you don't, you could risk your business for cyber attacks.
Managed Print | Cyber Security | HP
By:
Jada Sterling, Digital Content Manager
October 13th, 2023
HP is a leading print manufacturer in endpoint security. Their printers offer a unique set of security features, and some of which are even exclusive to the brand. With hackers finding new ways to target businesses, experts warn that digital printers may be a vulnerable endpoint for malicious cyber-attacks.
By:
Jada Sterling, Digital Content Manager
October 10th, 2023
On Thursday, October 5th, Usherwood partnered with Huntress to present a cybersecurity webinar addressing the growing business of cybercrime. Ethan Tancredi from Huntress spoke about how hackers are making money using the unique underground market for cybercrime and malware as a service.
By:
Jada Sterling, Digital Content Manager
October 5th, 2023
As cybersecurity becomes a necessity for every business, there are many different approaches to choose from. So, what areas of your business do you need to focus on the most for cybersecurity? What tools and strategies are best for remote work? With phrases like “Zero Trust”, “shadow IT” being tossed around, you may wonder: what’s the difference between zero trust vs VPN?
By:
Dan Smith
September 27th, 2023
It might be tough to keep track of all the different terms for cyber scams these days. First “phishing” was the term for email scams impersonating companies and other entities in attempts to gain personal information. Now, terms like vishing, smishing, pharming and even quishing are being thrown around. Here’s an overview of what they all mean.
By:
Jada Sterling, Digital Content Manager
September 25th, 2023
If your small to medium-sized healthcare clinic uses digital records, odds are you may be at risk for data breaches. HIPAA compliance is a priority for any business in healthcare. To protect sensitive data, you'll need to understand the risks of data breaches, types of breaches, and vulnerabilities that lead to them.
By:
Jada Sterling, Digital Content Manager
September 22nd, 2023
You might have heard the terms Zero Trust and Shadow IT recently but left wondering: "What is it?" and "Do I really need it?"
Managed Print | Cyber Security
By:
Jada Sterling, Digital Content Manager
September 21st, 2023
Of all the devices that we know can be hacked, you might not have considered your printer to be one of them. However, as printers become more advanced and able to connect to other devices, this poses a risk of cyber attacks. This is especially true for small-to-medium-sized healthcare businesses. Unsurprisingly, they are being targeted now more than ever due to the sensitive patient data they deal with.
By:
Jada Sterling, Digital Content Manager
September 15th, 2023
COVID-19 was a global crisis that shook up more than the healthcare industry. As the virus spread, more companies had to pivot from working in the office to remote or hybrid work models. With this unique challenge for IT came added security risks that hackers preyed on.