SPK is a proud partner of Pax8. And Pax8 is a reseller of AFI Backup. Because of our relationship with Pax8, SPK clients can access AFI Backup at a discounted rate for our clients that utilize Office 365. And, because SPK is highly experienced with AFI Backup we are...
Cybersecurity
LastPass Business For Corporate and Client Security
At SPK, we want to empower employees to safely manage their own passwords. Additionally, for organizations, we want to enable the enforcement of password standards. Businesses that follow good password standards, such as increased complexity, non-duplicate passwords ...
Six Advantages Of Using SentinelOne
SentinelOne is an endpoint security tool. It offers cybersecurity protection for platforms including laptops, PC, phones, cloud servers and identity server protection. And it is the next generation in vulnerability endpoint protection platform (EPP). SentinelOne is...
Bitdefender Antivirus In AWS – Top Five Advantages
Today, modern security tools including Bitdefender antivirus are known as EDR solutions (Endpoint Detection and Response). They are the next evolution of anti-virus software. Anti-virus software has always operated based on a “database” of malicious software...
Use Nessus To Harden Your Cybersecurity
Cybersecurity should be baked into the onset of IT and product development processes. Additionally, treating cybersecurity as an afterthought opens your organization up to vulnerabilities and risk. Therefore hardening your IT product cybersecurity with a tool like...
Protecting Device Storage Using Windows UWF
The Unified Write Filter (UWF) is a Windows native feature that ensures a system’s data remains as an unmodified, secure baseline. Data can be changed by a Windows UWF system user. However, the changes do not persist after a restart. In fact, changes are discarded...
Computer Systems Validation: How To Avoid FDA Warning Letters C.F.R. 820.70(i)
Computer systems validation (CSV) is a standard regulatory exercise Med Device companies are required to complete. This is not new news. In fact, the content in this article may not be “new news” for you either, but as with other regulatory requirements, it’s useful...
9 Things You Need To Know About Cybersecurity and Protected Health Information (PHI) breaches
In the past 18 months, there have been breaches of security related to protected health information (PHI) at Broward Health, Florida Healthy Kids, and the Accellion FTA Hack. In turn, these breaches resulted in 11 more healthcare organizations getting exploited. ...
5 Best Practices That Could Have Protected You From Log4J
Log4j: What Is It? On December 9, 2021, a critical exploit named "Log4j" was disclosed to the world. This exploit was particularly harrowing due to the fact that the software library which it targeted is so widely utilized. “Log4Shell” (CVE-2021-44228,...
How Cyber Security Requirements Can Throw your Medical Device Off Track
In our last article we talked about the four steps your organization must go through when designing secure connected medical devices. With the increasing attention paid to product security in this era of connected medical devices, many companies are scrambling to keep...
Four Steps to Securing Your Company’s Medical Devices
Connected medical devices offer enormous opportunity for manufacturers and consumers alike. They also carry the burden of increased risk due to cybersecurity flaws. Think about the dangers of having your email or bank account hacked. Now consider the damage hacking a...
How to Navigate Compliance and Cyber Security Concerns in Smart Medical Devices
The Internet of Things is revolutionizing the medical device field. However, it’s also introducing new compliance headaches. What’s more, large-scale medical hacks loom large in the background. Medical device manufacturers can’t ignore the Internet of Things, but nor...