Simultaneously, healthcare organization leaders must comply with stringent patient privacy and..
For the second consecutive year, Bedroc, Inc. has been named to the 2017 Inc. 5000 list, an annual list of the fastest growing companies in the United States, compiled by Inc. Magazine. The annual roster includes the fastest growing private companies among many verticals and industries. Inc. magazine ranked privately-held companies based on the percentage growth of revenue from 2013 to 2016. Additionally, companies must have earned more than $2 million in revenue in 2016.
From our partners at HPE:
"Rogue One: A Star Wars Story" isn’t just a tale of scrappy rebels fighting against an evil Empire. With the issues it raises, including device authentication, asset management, and privilege control, it’s also a story about information security. Well, more like a cautionary tale.
The Empire we love to hate has exhaust-port-size holes in the way it conducts its secret affairs. Seriously, it’s..
When we began evaluating our internal collaboration strategy, we solicited feedback from all of our Bedroc colleagues to capture their perspectives on how our current..
I grew up LOVING Star Trek: The Next Generation. One of the key elements of this show was the ship’s computer, LCARS, which could control and interact with various other systems and sensors of the ship on behalf of the crew. If I had to pinpoint anything in my life that drove me to IT, I think it would have to be how much I enjoyed the idea of the helpful computer in ST:TNG that made people’s lives easier.
You can imagine the waves of childish joy that fell over me upon..
There are serveral compelling reasons for enlisting a healthcare MSP,..
Clinical-grade cloud + mobile technologiesWhat’s in your healthcare equation?
Control your own medical records and get seamless, immediate access to doctors and specialists whenever you need them.
Customer service expectations are higher than ever, and patients are ultimately customers. They expect the same levels of service at the doctor’s office or hospital that they are accustomed to from other businesses, and that includes digital services accessible through their mobile devices...
Companies can reduce the risk from the type of cyberattack that took out major websites on Friday by using multiple vendors for the critical Internet service known as a domain name service, or DNS, companies and security experts said on Sunday.
“We have advocated for years for redundancy in your infrastructure,” said Kyle York, chief strategy officer for Dyn, the New Hampshire DNS provider that was attacked on Friday. “I don’t think you can ever be safe enough or redundant enough.”
Ransomware is obviously analogous to kidnapping, and dealing with the perpetrators can feel much like negotiating with a jumper standing on the edge of high-rise roof. The Institute for Critical Infrastructure Technology recently released a report that in part describes how to deal with criminals when they are holding your data hostage. The report talks of what to do once a breach has been found.
ICIT says the proper response will depend on the risk tolerance of the..
I recently attended a Lunch & Learn with our regional FireEye Team. My goal of attending the meeting was to understand the integration capabilities of the FireEye Solution and how the Mandiant Endpoint Software (now HX) features are progressing. Bedroc has been a FireEye Partner for approximately eighteen months and was recognized at FireEye’s Momentum 2015 Conference for putting together one of their largest deals of 2014.
The training started with..