Managed Services Articles

  1. IAOP 2016 Global Outsourcing 100 List Recognizes Excellence

    Accenture, Aegis, Shinetech Software among leaders for 2016. By Christine Kern, contributing writer

  2. Data Breach Affecting 59K Announced By Ohio Mental Health Department

    The Ohio Department Of Mental Health And Addiction Services (OhioMHAS) has announced a wide-reaching breach to affected patients. By Megan Williams, contributing writer

  3. BMC Receives Full FedRAMP Authorization Certification For Remedy OnDemand

    List of FedRAMP approved MSPs now growing. By Christine Kern, contributing writer

  4. OIG Finds 129 Medicare Security Gaps

    The OIG, the nation’s largest office dedicated to combatting waste and fraud within HHS programs, has released its review of Medicare contractors for fiscal year 2014. While some improvements were found, overall, most contractors have room for growth.

  5. Arm Your Payments Clients With DDoS Attack Protection

    Eight out of 10 companies that adopted IoT suffered DDoS attacks.

  6. 3D Printing’s Enormous Potential

    From the military to space and beyond, 3D printing is on the rise.

  7. Do New NIST Standards Mean A New Day For Healthcare Encryption?

    A new set of cryptographic standards released by the NIST could impact practices around healthcare data encryption.

  8. Healthcare Organizations Still Trust Slow-Moving Compliance Regulations Despite Risk

    The regulatory environment in healthcare is becoming increasingly complex, but healthcare organizations are still managing to keep up. Unsurprisingly, this has created an environment where compliance with regulations frequently takes precedence over actual security.

  9. Managed Services, Backup And Disaster Recovery, And Networking News

    IT professionals can now protect their virtual environments through socket-based pricing for StorageCraft ShadowProtect SPX. The new licensing model allows IT administrators to purchase licenses based on the number of CPU sockets on the host, both VMware and Microsoft, and protect an unlimited number of virtual machines per licensed socket.

  10. ICIT: Layered Defense Is Only Way To Combat Ransomware

    Endpoint security should be the first layer in the complex defense against attacks.