Blog

The pitfalls of business continuity planning

If you have been using the same business continuity plan (BCP) for years, your organization may be in trouble. BCPs should continuously be updated so you avoid overlooking or underestimating certain issues. Not updating your BCP is just one mistake that can harm your business.

DCI Partners with RESULTS Technology to Deliver Unique Cybersecurity Tool to Banks

LENEXA, KAN., Sept. 21, 2020 –Data Center Inc. (DCI), the privately-owned developer of iCore360® core banking software and related technologies for community financial institutions nationwide, announced today they will be partnering with RESULTS Technology, the award-winning technology services firm specializing in the banking industry to provide a robust cybersecurity tool to its banking clients.

How to be proactive with your cyber defenses

As soon as you focus on preventing downtime events instead of reacting to them, the productivity and efficiency of your IT infrastructure will increase to levels you’ve never dreamed of. It is good to have an IT team and/or a third-party partner like a managed services provider (MSP) that helps keep your company protected against […]

5 Best practices for securing PHI

Protected health information (PHI) includes personal, medical, and financial information, as well as other data created or used when a patient sought and received healthcare services. Due to the sensitive nature of PHI, it is highly valuable to hackers — and this is why your healthcare organization must do everything possible to protect any PHI […]

Webinar: Cybersecurity for businesses with remote employees

Join RESULTS Technology for a Small Business Webinar as we present Cyber Security for businesses with remote employees. We will discuss why a secure remote connection is important, the types of remote connections, safety requirements for remote connections and the risk levels associated with each.

Now is the time to implement multi-factor authentication

Cyber attacks are not slowing down. And with more and more people accessing company networks remotely, the problem is only getting worse. All it takes is one compromised credential or legacy application to cause a data breach. Now is the time to step up your security.

Risk Levels of Various Remote Access Methods

The pandemic has forced many of us to implement work from home procedures. But what are the risks associated with permitting network access from outside of the secure perimeter of your company's internal network? To keep your business safe, make sure you have at least the minimum security measures in place.

A smart approach to your cybersecurity investment

Cybersecurity is a threat to businesses across industries, especially banks and other financial services firms. Sometimes, organizations invest in security software without realizing the risks that come with it. Here are compelling reasons why identifying threats before buying cybersecurity products is paramount.