top of page
Search


Best Practices: Social Media Accounts
Cyber threat actors target social media accounts in takeover attempts, with the goal of posting fictitious or embarrassing information. Cybe
Dec 7, 20172 min read


Tips to Protect Customer Data
We provide a few simple tips to protect customer data and personally identifiable information (PII) that don't involve typical cybersecu
Dec 6, 20172 min read


What are Federal Information Processing Standards?
Federal Information Processing Standards (FIPS) are standards and guidelines issued by the National Institute of Standards and Technology (N
Nov 29, 20172 min read


Is my computer infected with malware?
Knowing what kind of threats are out there is an important first step in protecting your device. Threats can come from a variety sources: th
Nov 22, 20172 min read


Are Smartphones HIPAA Compliant?
HIPAA applies to any mobile device where PHI is stored or transmitted.
Nov 17, 20172 min read


Finding the Best Phone System for Your Business: Step 4
Step 4: Lay Out Your Budget First and foremost: what does your budget look like? If you have a very small budget, with limited funds for...
Nov 13, 20173 min read


Finding the Best Phone System for Your Business: Step 3
STEP 3: DO A TECHNICAL INVENTORY Once you’ve addressed who your users are, and identified some key features that will help your business...
Nov 9, 20173 min read


Data Recovery Prevention and Protection
Data loss can happen to anyone. For many businesses and organizations, data is the heart and center of daily operations. We've discussed
Nov 8, 20172 min read


The History of HIPAA
We understand that protecting PHI is vital to the healthcare industry, and as healthcare grows further into the digital age it becomes more
Nov 2, 20173 min read


What Industries Need IT Managed Services?
IT managed services providers cover a number of verticals. Bedrock's diverse background combines knowledge of information technology sup
Oct 26, 20172 min read


Finding the Best Phone System for Your Business: Step 2
Once you’ve identified your key players, you can start to build an idea of what features your business needs to function. This is a great ti
Oct 24, 20176 min read


Everything you need to know about KRACK, the Wi-Fi security flaw.
A newly revealed Wi-Fi weak spot puts just about every device at risk, from your work computer to the phone in your hand and the laptop you
Oct 23, 20174 min read


Benefits of Speech Recognition Software
Healthcare organizations are being constantly pressured to improve clinical documentation. Not only does improved documentation aid in abidi
Oct 20, 20172 min read


Survey Reveals Most US Workers Misunderstand Cybersecurity
A 2017 report from Wombat Security revealed that most US workers don't understand concepts like ransomware and Wi-Fi security. These tip
Oct 19, 20175 min read


Are You FERPA Compliant?
We continue our compliance series with a focus on The Family Educational Rights and Privacy Act (FERPA).
Oct 18, 20172 min read


What is compliance?
We discuss what compliance is, and various regulations that may affect your business.
Oct 10, 20172 min read


How to Find the Specs on Your Phone, Computer, and Tablet
If you’re selling these gadgets, or trading them in, or comparing your gear against the newest models on the market, you’re going to need to
Oct 6, 20176 min read


Finding the Best Phone System For Your Business: Step 1
This guide is here not only to help you find a phone system to meet your communications hardware needs, but also to find a system that will
Oct 5, 20172 min read


Cybersecurity Best Practice Series: Website Navigation
We finish off our cybersecurity mini series with a round up of tips on how to surf the net safe and secure.
Oct 4, 20172 min read


5 Cybersecurity Facts and Statistics For 2017
These top level numbers summarize the cybersecurity industry over the past year and indicate what's in store for the next five years.
Oct 2, 20172 min read
bottom of page