<img height="1" width="1" src="https://www.facebook.com/tr?id=1236948446433890&amp;ev=PageView &amp;noscript=1">

StratX IT Healthcare Blog

IT Solutions & Strategies

StratX IT Healthcare Blog

Windows 7 Already Under Attack - Two ways to stop the attacks fast.

May 29, 2019 by StratX IT

It’s already starting. Security researchers have indicated trends of attacks targeting Windows 7 users running mySQL databases. These Windows databases are being infiltrated with ransomware called GrandCrab (detected as Ransom.Win32.GrandCrab.SMILC) Primarily this infection is utilizing the...

Read More »

60-Minutes Episode on Ransomware On-Air May 5th, 2019

May 21, 2019 by StratX IT

Visit CBS's 60-Minutes Episode, "How cybercriminals hold data hostage... and why the best solution is often paying a ransom"

Targets have included hospitals and municipalities, but the FBI says anyone on the internet should expect to be attacked by cybercriminals.

Read More »

MSP Voice Podcast Places StratX IT in the Top 10 Interviews of 2019

May 21, 2019 by StratX IT

Award-Winning Podcast: MSP Voice Episode 13: “SALES!” with Jack Mortell from StratX IT

We are grateful to announce that StratX IT has been chosen as this year’s recipient of the Top 10 Podcast Interviews of the Year Award. This award is given annually to the top ten guests on the show that...

Read More »

Did You Know You Can Outsource Your HIPAA Compliance Management to Experts?

January 27, 2017 by StratX IT

In order to keep patient data secure, The Health Insurance Portability and Accountability Act (HIPAA), sets strict guidelines for the Healthcare Industry. While it may seem like a hard pill to swallow, HIPAA laws are not going to change any time soon and it's vital that healthcare providers work...

Read More »

Protecting ePHI—is HIPAA-compliant e-mail enough?

January 20, 2017 by StratX IT

The ONC’s wall of shame documents that exposure due to “non-compliant e-mail” is up 1,500% between 2013 and 2017. And this data doesn’t include all of the hundreds of thousands of records exposed due to unauthorized access associated with transmitting unsecured data.  

Read More »