Life’s a Breach

It’s very likely that some of your most sensitive information is vulnerable, out there just for the taking. “How is that possible?” You may ask. “I have 2-factor authentication configured on all of my social and business accounts!”. Indeed, the information you manage may be secure, but what about sensitive information pertaining to you, but…

Virtual Reality Adversaries Are On The Prowl

Virtual Reality Hacking

Unwelcome Guests The frequency, potency, and sophistication of cybersecurity threats continue to surge. Any business which employs digital technology, which is to say all businesses, is vulnerable to the attacks of an assortment of rogue digital adversaries, from individual “hackers” (a misnomer we will confront and clear up) to networks of dissident programmers bound together…

ditch the disk, ditchthedisk, cd

It’s Time To Ditch The Disk in Radiology #ditchthedisk

Medical imaging is critical for the detection and evaluation of cancer and other diseases. Routine screenings can reveal cancers or other afflictions, even when they not directly tested for. Using imaging, Radiologists must be able to assess disease path overtime to supply the best patient care.  Radiology and imaging have made leaps into the future by implementing groundbreaking methods of capturing images. Yet, throughout all this innovation, the actual scan transfer of patient imaging is…