Strong Perimeter IT Defense – What Is It and Why Your Business Can’t Survive Without It

Layering security methods reinforces the ability of organizations to prevent cyber threats from penetrating security perimeters. The idea behind the efficacy of layered security is that any individual defense mechanism, no matter how healthy and robust it seems, may be flawed to the point it permits

Read Full Article

Dental Association Mistakenly Sends Malware to its Members

Most people think that malicious computer malware is spread as a result of downloading a file from a website, an e-mail attachment or an online file sharing service. Yet it is also possible to transmit malware through a simple USB thumb drive. The American Dental Association (ADA) and thousands of d

Read Full Article

The $3 Million Phishing Problem at Mattel is More Common Than You Think

One of the most common types of cyber attacks that both businesses and personal users have to contend with today’s is called a “phishing” attack. In An attacker will pose as a legitimate company or other business contact in an attempt to steal valuable information from their victim. For, examp

Read Full Article

Breach according to HIPAA standards — At what point is the user’s computer system at fault?

Today, HIPAA continues to protect private health information (PHI), while improving how healthcare administrative and financial data is processed through electronic transmissions. Medical practitioners have improved services and treatment with immediate access to a patient's health information. Pati

Read Full Article

Do YOU Leave USB Drives Laying Around?

You Might Want to Think Again   With flash-based storage devices like USB thumb drives becoming more affordable with each passing day, it’s common to find one – or many – laying around offices, classrooms and more. If you’re the type of person who stores important documents on a thumb dr

Read Full Article

New HIPAA Audits Become Reality as Feds Launch Phase 2

In its long-awaited Phase 2 audits, the Health and Human Services Department's Office for Civil Rights (OCR) moved forward with ensuring compliance with federal privacy laws. The first phase, which launched in 2012, involved an OCR assessment of 115 covered entities. In March 2016, this second phase

Read Full Article

How Should You Ensure HIPAA Compliance?

Being compliant with the Health Insurance Portability and Accountability Act or HIPAA is exceedingly important for medical providers as being found noncompliant could bring large fines or even cause health care providers to lose their licenses. The HIPAA guidelines require all medical practices keep

Read Full Article

Keeping Your Computer Secure From Ransomware

Regardless of whether you're a home user, a business user, or even head of your company's IT department, very few computer issues cause more worry than malicious software. The most troubling of these in recent years has been ransomware like the infamous Cryptolocker. It's estimated these programs ha

Read Full Article

Globalquest Achieves Ranking In ChannelE2E’s 100 Managed Services List

Williamsville, NY - Globalquest Solutions, Inc. is pleased to announce today that After Nines Inc.'s ChannelE2E has named Globalquest Solutions, Inc. to its ChannelE2E 100 - 2016 Edition List. According to ChannelE2E, this list was established to "identify and honor the top entrepreneurs, startups

Read Full Article

Reasons for Updating Your Current IT Operations After 10 Years

It's been 10 years since HIPAA became law, and the healthcare industry has taken a front position in managing sensitive information of U.S. medical records. As many of us know, even the most advanced systems in technology are constantly developing to improve how business gets done. It's time for ano

Read Full Article
IT support buffalo