The search found 3911 results.
Blog Post
It’s no news to healthcare-related organizations that if they handle personal health information (PHI) or electronic personal health information (ePHI), they are required to maintain HIPAA/HITECH compliance. These regulations are stringent, and staying compliant can be difficult.
Blog Post
In these strange times of Covid-19, companies face increased and expanded cybersecurity threats. Enterprise security perimeters expanded exponentially almost overnight as both employees and vendor reps work from their homes.
Blog Post
When the event hit the news that the medical debt collector American Medical Collection Agency (AMCA) suffered a massive data breach last year, businesses from various industries were shaken.
Blog Post
The manufacturing industry, like so many others, is undergoing massive change. With the introduction of technologies like 3D printing, Internet of Things (IoT) and Industrial Internet of Things (IIoT), companies have been able to disrupt the industry extremely quickly with creative ways to manufacture products. However, these new tools, increasingly connected to global networks, have created heightened vulnerabilities to cyberattacks.
Blog Post
Third-party risk management, or TPRM, is becoming a big deal in IT and Information security circles. This is because a large number of breaches and hacks are being connected to insecure or mismanaged third parties such as vendors, supply chain partners, and cloud companies providing infrastructure or software applications.
Blog Post
Remote access has become an irreplaceable tool for the success of many companies, but using it safely and securely is difficult.
Blog Post
The success of business projects and the associated technology solutions to implement them are almost always graded on how much return on investment (ROI) they deliver back to the business for the investment required.
INFOSISTEM is the leading regional system-integrator and a company with extensive experience in information technology, whose origins date back to 1959. Thanks to knowledge and experience of its professionals, INFOSISTEM became a natural choice and a stable backbone of many large business systems. We use cutting-edge technology like Imprivata in all the areas we work in so that we can design and implement the very best and secure systems for our clients.
Our reference list shows our presence not only in the Republic of Croatia, but also in the entire region.
Blog Post
Once implemented, these upcoming regulations will ensure electrical utilities are safer from cyber threats, especially those brought in by third parties. Breaches and incidents at utility and other energy-related companies have been rising faster than an electric bill in a Texas summer.
Blog Post
In our previous blog, we explained how cyberattacks are putting manufacturing systems at greater risk of data loss and malicious activity. Now let’s look at strategies companies can take to tighten up some of the security gaps that can leave manufacturing systems vulnerable to attack.