Blog

No. 1 Tech Tip for Earning MIPS Points

By Robbie Morris on Jul 9, 2018 3:15:12 PM

All healthcare providers that accept Medicare or Medicaid patients have heard of MACRA (Medicare Access and CHIP Re-authorization Act), a reward-based financial reimbursement program for providers that deliver a higher quality of care and increased positive patient health outcomes at lower costs. That’s where MIPS – Merit-based Incentive Payment System – comes in and our best tip for earning the points you need to get a full reimbursement.

Read More

Topics: Healthcare, cybersecurity

Webinar: Password Cracking 101

By TekLinks staff on Jul 3, 2018 2:40:36 PM

Criminal hackers aren’t nearly as focused on your business' administrative accounts as they are individual employee accounts. Why? Because admin accounts rarely have direct access to highly valuable information like social security numbers, protected health information, etc.

Read More

Topics: TekLinks News, cybersecurity

Password Cracking – Here’s How the Pros Do It

By Nick VanGilder on Jul 2, 2018 8:50:14 AM
Most companies freely acknowledge that a data breach event would cause significant impact to their business. If a company processes, stores and accesses sensitive customer information (i.e. medical records, credit cards, social security numbers, etc.), it would also acknowledge that it already knows what types of data the criminals mostly like want to steal … or hold hostage.
Read More

Topics: passwords, cybersecurity

How to Get the Most Value from Breach Simulations

By Will Enochs on Jun 12, 2018 3:38:20 PM

In case you missed it, I recently wrote a blog detailing how to run your own breach simulations. But do you know why running them is important? Defining the outcome is the first step to determine the answer to this question. 

Read More

Topics: cybersecurity

Webinar: The Breach Your Antivirus Missed

By TekLinks staff on Jun 7, 2018 1:22:56 PM

Ethical hackers routinely find computer systems connected to production networks that have been compromised for months. In most cases, the telltale signs of compromise are present, but the right people weren’t watching or being alerted to the activity.

Read More

Topics: cybersecurity

How to Run Your Own Breach Simulation

By Will Enochs on Jun 5, 2018 2:49:44 PM

As a professional ethical hacker, I’m often enlisted to gain access to a company’s IT environment to identify security gaps and vulnerabilities. Although I recommend companies perform professional engagements such as these, I also recommend regular self-assessments, as well.

Read More

Topics: infosec, cybersecurity


WHO IS TEKLINKS? A national leader in cloud computing, managed services, engineering services, and value-added resale. We’re a team of expert techies and business professionals who are passionate about building valuable relationships and getting things done right. Simply put: We make IT work for business.

New call-to-action
New call-to-action
New call-to-action

Sign Up for Blog Updates

Popular Posts: