Blog

WellPoint Fined $1.7M For ePHI Disclosure

The US Department of Health and Human Services (HHS) announced last week that the managed care company WellPoint, Inc. had agreed to pay a fine of $1.7 million to settle potential violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) privacy and security rules. […]

Read more

Idaho State University fined $400,000 for skipping HIPAA Security Risk Analysis

Skipped HIPAA Security Risk Analysis costs ISU $400,000 IT consultants and Managed IT service providers have been warning their clients that the HIPAA Security Risk Analysis is a very necessary component in their efforts to comply with the HIPAA rule. Some of our medical clients and prospects […]

Read more

Goodbye Windows XP

It’s nearly time to say goodbye Windows XP. This past April marked the one year count-down to the eventual discontinuation of support for the venerable operating system (technically on April 8, 2014). What does this mean to you? In short, it’s high time you moved on and […]

Read more

RescueSMB Backup and Disaster Recovery

Thom Infotech is pleased to announce our new RescueSMB Backup and Disaster Recovery program. This solution brings enterprise-class business continuity capabilities to the Small to Medium Business (SMB) community in an affordable and convenient package. RescueSMB boasts the following features: Frequent Backups –  As often as every […]

Read more

Business Continuity Planning

Keeping your business afloat after a disaster As the owner of a technology consulting firm, I’m occasionally asked to assist with Business Continuity Planning (BCP). As the name implies, BCP is a discipline that attempts to answer the “what if” questions that surround the viability of a […]

Read more

Oracle closes critical Java vulnerability

Oracle announced today the release of updates for Java versions 5, 6, and 7 to patch a critical java vulnerability actively being exploiting in the wild. The patches were reportedly slated for release in April but the timetable was pushed up in response to a recent report […]

Read more

Anti-virus software alone is not enough

“Anti-virus software alone is not enough”… so says the number one antivirus provider Symantec in this post. A rather stunning admission I would say, and something many in the security industry have known for quite some time. The admission comes on the heels of the successful infiltration […]

Read more

Apple blocks vulnerable Flash plugins

Kudos to Apple. Last week they decided to start blocking vulnerable versions of Adobe Flash plugins from running in the built-in Safari web browser. This is in direct response to the active exploits in the wild affecting Macs as well as PCs. Users who fail to update […]

Read more

Yet Another Java Zero-Day

Researchers at the respected security firm FireEye have discovered yet another Java zero-day attack that leverages previously unknown vulnerabilities with the latest versions of Java (as of this writing Java v1.6 Update 41 and Java v1.7 Update 15) to install malware. This comes on the heels of […]

Read more

Evernote hack results in forced password change

Evernote is a really cool app. I use it heavily in conjunction with David Allen’s “Getting Things Done” system to organize my day and achieve my goals. I also use it for more mundane tasks such as grocery lists. I use it on my PC, my iPad, […]

Read more

Contact

Thom Infotech
480 E. Roosevelt Rd. Suite 202
West Chicago, IL 60185
Phone: 630 937-1500
Fax: 630 937-1515

Open a Ticket


Need Help? Click here to submit a ticket directly to our support team.