Press Release

Anatomy IT Acquires IRIS Solutions to Expand Presence in Ambulatory Healthcare

White Plains, NY – Anatomy IT, the leading platform for healthcare IT and cybersecurity solutions, announced today the acquisition of IRIS Solutions, a respected and experienced leader in healthcare technology services for dental practices and healthcare providers. This strategic acquisition allows Anatomy IT to expand its presence in the ambulatory healthcare sector and bring its […]

Education Technology

Ransomware: Never Pay and Why

About Ransomware Ransomware is a perennial buzzword across all industries. Unfortunately, this topic is perennial because the threat that ransomware poses to business operations and client data safety continues to crop up time and time again. While the topic of ransomware can feel intimidating and nebulous, the concept itself is actually quite simple. Ransomware is […]

Education Technology

Cybersecurity Threats to be Aware of in 2023

As we enter 2023, it is important to be aware of the top cybersecurity threats organizations face. Chief Information Officers (CIO’s) have declared cybersecurity as a top concern for 2023 and with protections needed on many fronts, it’s hard to argue with their logic.   Top cybersecurity threats projected for 2023: Phishing Phishing emails have […]

Education Technology

How to Stay Safe Online When Traveling

As we enter the holiday season you may have some travel plans approaching. Although you may not have your computer with you, you may need to stay connected to work by utilizing your cell phone. There are various ways in which you can travel while maintaining your safety online during your vacations this season. Review […]

Education Technology

Vulnerability Assessment for the Healthcare Industry

On September 30th The White House designated October as Cybersecurity Awareness Month and encouraged the public and private sectors to take immediate action to protect against cyber threats:  “Cyberattacks affect our day-to-day lives, our economy, and our national security.  By destroying, corrupting, or stealing information from our computer systems and networks, they can impact electric […]