John Harris, chief technology office of SIGNiX, recently wrote an article for American City & County about the importance of creating strong passwords to protect sensitive data. His article outlines six important to-dos and six equally important not-to-dos when creating online passwords. In the article, John tells us:
Posts by John Harris:
John Harris, chief technology officer of SIGNiX, recently wrote an article for BOSS Magazine about affordable ways companies can strengthen their cybersecurity efforts. In the article, John explains how important it is to train employees on cyber risk, and he says:
John Harris, chief technology officer of SIGNiX, recently wrote an article for Health IT Outcomes about ways healthcare organizations can protect sensitive patient data. In the article, he discussed the importance of using modern, up-to-date software and equipment. He says:
John Harris, chief technology officer of SIGNiX, recently wrote an article for ThinkAdvisor about training employees and customers on email security. In the article, he explains how important it is to learn how to detect a fraudulent email and says:
John Harris, chief technology officer at SIGNiX, recently wrote an article for Small Biz Daily about steps small businesses can take to protect consumer data. In the article, he said:
There are a lot of reasons digital signatures are great for business. They’re fast. They save money. They improve document accuracy. They boost security. They’re easy to use.
Whether the paperless office has actually arrived is debatable, but there’s no question that almost every business today is at least leaning towards the digital direction. For many companies across the industry spectrum that includes changing the way their staff – and their clients – sign contracts, forms and other documents.
Move over public speaking. Now, cyber-terrorism, corporate tracking of personal information, identity theft and credit card fraud are among Americans’ top 10 fears, according to research from Chapman University.
Technology progresses quickly, but the adoption of technology is a seemingly slower process. That's why we're thrilled to see the momentum of technology adoption in healthcare move from our December 2015 blog title, Let’s Make Two-Factor Authentication More Prominent in Healthcare Than Data Breaches, to our recently published article, Multi-Factor Authentication Gains Traction In Healthcare.
One of the best ways to improve is to learn from others’ mistakes. The good news is, with cyber security, there’s no shortage of curriculum.