top of page
Search


Best Practices: Social Media Accounts
Cyber threat actors target social media accounts in takeover attempts, with the goal of posting fictitious or embarrassing information. Cybe
Dec 7, 20172 min read
50 views
0 comments


Tips to Protect Customer Data
We provide a few simple tips to protect customer data and personally identifiable information (PII) that don't involve typical cybersecu
Dec 6, 20172 min read
58 views
0 comments


What are Federal Information Processing Standards?
Federal Information Processing Standards (FIPS) are standards and guidelines issued by the National Institute of Standards and Technology (N
Nov 29, 20172 min read
31 views
0 comments


Is my computer infected with malware?
Knowing what kind of threats are out there is an important first step in protecting your device. Threats can come from a variety sources: th
Nov 22, 20172 min read
37 views
0 comments


Are Smartphones HIPAA Compliant?
HIPAA applies to any mobile device where PHI is stored or transmitted.
Nov 17, 20172 min read
44 views
0 comments


Finding the Best Phone System for Your Business: Step 4
Step 4: Lay Out Your Budget First and foremost: what does your budget look like? If you have a very small budget, with limited funds for...
Nov 13, 20173 min read
17 views
0 comments


Finding the Best Phone System for Your Business: Step 3
STEP 3: DO A TECHNICAL INVENTORY Once you’ve addressed who your users are, and identified some key features that will help your business...
Nov 9, 20173 min read
36 views
0 comments


Data Recovery Prevention and Protection
Data loss can happen to anyone. For many businesses and organizations, data is the heart and center of daily operations. We've discussed
Nov 8, 20172 min read
56 views
0 comments


The History of HIPAA
We understand that protecting PHI is vital to the healthcare industry, and as healthcare grows further into the digital age it becomes more
Nov 2, 20173 min read
62 views
0 comments


What Industries Need IT Managed Services?
IT managed services providers cover a number of verticals. Bedrock's diverse background combines knowledge of information technology sup
Oct 26, 20172 min read
510 views
0 comments


Finding the Best Phone System for Your Business: Step 2
Once you’ve identified your key players, you can start to build an idea of what features your business needs to function. This is a great ti
Oct 24, 20176 min read
23 views
0 comments


Everything you need to know about KRACK, the Wi-Fi security flaw.
A newly revealed Wi-Fi weak spot puts just about every device at risk, from your work computer to the phone in your hand and the laptop you
Oct 23, 20174 min read
33 views
0 comments


Benefits of Speech Recognition Software
Healthcare organizations are being constantly pressured to improve clinical documentation. Not only does improved documentation aid in abidi
Oct 20, 20172 min read
573 views
0 comments


Survey Reveals Most US Workers Misunderstand Cybersecurity
A 2017 report from Wombat Security revealed that most US workers don't understand concepts like ransomware and Wi-Fi security. These tip
Oct 19, 20175 min read
36 views
0 comments


Are You FERPA Compliant?
We continue our compliance series with a focus on The Family Educational Rights and Privacy Act (FERPA).
Oct 18, 20172 min read
127 views
0 comments


What is compliance?
We discuss what compliance is, and various regulations that may affect your business.
Oct 10, 20172 min read
73 views
0 comments


How to Find the Specs on Your Phone, Computer, and Tablet
If you’re selling these gadgets, or trading them in, or comparing your gear against the newest models on the market, you’re going to need to
Oct 6, 20176 min read
1,040 views
0 comments


Finding the Best Phone System For Your Business: Step 1
This guide is here not only to help you find a phone system to meet your communications hardware needs, but also to find a system that will
Oct 5, 20172 min read
34 views
0 comments


Cybersecurity Best Practice Series: Website Navigation
We finish off our cybersecurity mini series with a round up of tips on how to surf the net safe and secure.
Oct 4, 20172 min read
55 views
0 comments


5 Cybersecurity Facts and Statistics For 2017
These top level numbers summarize the cybersecurity industry over the past year and indicate what's in store for the next five years.
Oct 2, 20172 min read
112 views
0 comments
bottom of page