Free HIPPA Checklist

Managing security in the healthcare world is no easy task.​  Healthcare leaders are facing new technical and security challenges in the wake of ransomware attacks that have hit the industry, as well as the COVID-19 induced shift to remote and hybrid-remote workforces.This checklist is designed to help make sure that you and your team is in compliance. […]

Network Intrusions and Ransomware Attacks Overtake Phishing as Main Breach Cause

Network intrusion incidents have overtaken phishing as the leading cause of healthcare data security incidents, which has been the main cause of data breaches for the past 5 years. In 2020, 58% of the security incidents dealt with by BakerHostetler’s Digitial Assets and Data Management (DADM) Practice Group were network intrusions, most commonly involving the […]

$99 Cyber Security Check-up Special

Bourn Technology is a local leader in IT consulting and managed IT services Call us today 504-262-1234 to schedule a free, no obligation consultation. what do you have to lose besides all of your data Follow and connect with us on Twitter, Facebook, Linkedin

5 Steps to Better Business Management Tech for your Remote Workforce

bourntech.com Bourn Technology is a local leader in IT consulting and managed IT services Call us today 504-262-1234 to schedule a free, no obligation consultation. what do you have to lose besides all of your data Follow and connect with us on Twitter, Facebook, Linkedin

As U.S. cities embrace tech, cyberattacks pose real-world risks

The word “cyberattack” usually brings to mind hackers breaking into a company or government agency, wreaking havoc and stealing valuable data. Reuters April 07, 2021, 15:39 IST By Jack Graham TORONTO: The word “cyberattack” usually brings to mind hackers breaking into a company or government agency, wreaking havoc and stealing valuable data. But for an employee […]

Got A Bad Case Of Password Exhaustion?

Got A Bad Case Of Password Exhaustion? You’re not alone! Most people use the same password everywhere – home, work, Gmail, Facebook… even for banking.Considering how many passwords we’re expected to remember and use on a daily basis, password exhaustion is a very real thing. It’s no wonder that when yet another prompt for a […]

5 Red Flags Of Phishing Emails: Think Before You Click

5 Red Flags of Phishing Emails: Think Before You ClickA single click can be the difference between maintaining data security and suffering massive financial losses. From the moment just one employee takes the bait in a phishing email, your business is vulnerable to data breaches and extensive downtime.Quickly spot the red flags and put phishing […]

What Is a VPN and Why Do I Need One?

Ever seen a thriller in which someone asks, “is this a secure line?” The good guys or villains want to be sure their conversations can’t be overhead. When you get a VPN to connect to the Internet, you’re signing up for the online equivalent of a secure line. VPN stands for virtual private network. Put […]

Time to Replace Your Laptop Battery?

Your laptop computer may feel like a lifeline. It has everything important on it, both personal and professional! Regrettably, the time does come when you need to replace it. Yet, some computer problems could be solved instead by replacing the laptop battery.Some computers now come with a variation on the car dashboard indicator light. You […]

Why You Need to Uninstall Adobe Flash Player

All good things must come to an end – it’s inevitable with computer software. If you’re using Adobe Flash, the day has arrived. It’s time to uninstall Adobe Flash Player.Adobe stopped supporting Flash Player on December 31, 2020. What does this mean?Adobe is no longer issuing Flash Player updates or security patches. The company “strongly […]

Let's Talk...

SCHEDULE A GETTING TO
KNOW YOU
CALL TODAY

Give us a call at (504) 262-1234 or complete the form below and we’ll follow up with contact details for your call.