Login 

Call Us Now:

Weston Technology Solutions Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Subscribe to this list via RSS Blog posts tagged in Encryption

healthcareitOregon Health & Science University (OHSU) had a data breach in 2013 that resulted in a recently-assessed $2.7 million HIPAA violation settlement. The sad thing was, they knew they had these problem (as they had run several risk analyses that showed issues), but didn’t take measures to fix them. While OHSU is a large teaching hospital, the lessons learned here are lessons that apply to any business of any size – medical or otherwise -- that has access to electronic protected health information (ePHI). Read on for a few things that OHSU could have done to help prevent this from happening.

Changes to WestonBlock Are Coming

Posted by on in Alerts

WestonBlockThe system that powers our popular spam-blocking and email continuity service WestonBlock is going to be changing. WestonBlock is powered by software called MX Logic from McAfee. McAfee was recently purchased by Intel. Intel decided to close their support for MX Logic and similar cloud-based services.

What does that mean for you, if you use WestonBlock? Nothing, at the moment. They’ve agreed to leave everything alone for the rest of the year for existing accounts. However, we are being proactive about it and making sure our clients are aware there is a change coming.

Tagged in: Cloud Email Encryption Spam

HIPAAWe’ve mentioned before, but we know a thing or two about HIPAA and provide many HIPAA-friendly services. We have been asked why we insist on doing things a certain way, and we generally will refer back to HIPAA guidelines. Specifically, here are some of the laws and HIPAA security-rule guidelines that we refer to in the way we recommend your business does things.

seccompWe’ve been an increasing number of attacks on PPTP VPN connections. PPTP VPN connections are the most common method for users to use a VPN connection to connect to their server back at the office. Recent attacks on a few of our clients have made us recommend (in some cases) an alternative VPN option to protect your server from these types of attacks. Read on for how you can help protect your server with a Sonicwall VPN connection and Intrusion protection.

Email is a lifeblood for many businesses both for communications internally but external client communications as well. We've discussed previously the importance of encrypting data at rest, but what about data in transit like all the information your business is sending via email. Are you sending any sort of personal, private, or confidential information email to outside parties? What would happen if that email were to fall into the wrong hands or be read by an unintended recipient? Let Weston help you with that with email encryption solutions.