Archive for the ‘Security’ Category

HIPAA 101 – An introduction to HIPAA 

HIPAA, otherwise known as the Health Insurance Portability and Accountability act, which was first introduced in 1996, demanded that the department for human services and health in the U.S. (HHS) should create specific regulations  to protect the security and privacy…

Common Mistakes in Picking the Right Solution for Cloud Security

According to the Verizon State of The Market: Enterprise Cloud 2014 Report, the cloud rush is on. Already, more than 65% of enterprises have adopted it, and many more are considering it as a vital resource for business growth. With…

Why Government Should Focus On e-Discovery Tools

Would it surprise you to know that 93 percent of all documents in the world are created electronically, of which 70 percent never even go through a hard copy conversion? this fun fact is not from some 2015 survey, but…

What is PII and PHI Security & Why is it Important?

The Federal government requires organizations to identify PII (Personally Identifiable Information) and PHI (Protected Health Information) and handle them securely. Any unauthorized release of this data could result in severe repercussions for the individual whose information has been compromised, as…

Best Practices for Data Governance in Healthcare

Multiple investigations are currently in progress to analyze the data breach at Anthem insurance, in which over 80 million records were stolen including SSN, credit card and medical history.  The incident shows how hackers are increasingly targeting health care industry, mainly for its rich…

Top 10 Troubleshooting Tools for System Admins

Some of the biggest and the most prominent fire-drills that arise for system admins are the issues associated with troubleshooting system. Without the right tools, it can be practically impossible to track down the origin of faults,  fix the problem…

How to Pick the Right Storage Solutions for Government Agencies

Apart from businesses and corporations, government agencies are other major consumers of storage solutions nationwide. Before the Federal Data Center Consolidation Initiative, government agencies largely relied on in-house storage systems that compromised of thousands of data storage drives in unconsolidated…

Top 10 Cyber Hacks of 2014

When it comes to security breaches, 2014 was an unprecedented year. Attacks were launched against some of the biggest corporations and most famous celebrities in the world. The tip of the cyberwar was reached with the controversy that the James…

Best Practices for Data Loss Prevention

  Just about every organization or business that exists today has an ingrained fear when it comes to protecting information. No-one wants to lose their confidential, critical or highly restricted data, and the fear of losing this data becomes even…

Top Trends in Virtualization for Small and Medium Businesses

  Virtualization as a technology has significantly grown since the 1960s, when IBM came up with the IBM System/360 Model 67, which is largely considered to be the first ever virtual machine. After reportedly surpassing 50% of all server workloads,…

Worldwide

FileCloud
CodeLathe Technologies Inc.
dba FileCloud
125 Park Avenue FL 25
New York, NY 10017-5550

Fax: +1 (866) 824-9584

Europe

FileCloud Technologies Limited
Ducart Suite,
Castletroy Park Commercial Centre, Castletroy,
Limerick, Ireland


Copyright © FileCloud. All Rights Reserved.