Privacy Tag - Kutztown, Pennsylvania | Lantek

    blog-img

    We frequently discuss the importance of keeping PII—personally identifiable information—secure, but what does this include? What data qualifies as PII?

    Read More
    blog-img

    We bet you’ve gone through your old files at some point to clean things up a bit by deleting files from your computer. What if we told you that deleting those files doesn’t actually delete them—at least not entirely? Let’s go over how you can securely delete your files for good while you go about replacing hardware or upgrading your technology systems.

    Read More
    blog-img

    For years you’ve heard how technology is becoming a bigger part of the healthcare delivery system and how it can help stabilize costs, provide increased access, and further personalize care delivery. As these innovations have been taking hold it has brought up serious questions about data privacy. Today, we’ll take a look at some of the changes IT has brought to healthcare and what it means for patient data privacy. 

    Read More
    blog-img

    Privacy for business means a lot more than protecting the data and personal information of clients. It also extends to just about all data collected by a business, including that of the employees. How can you go about protecting this data without also violating the privacy of your employees themselves?

    Read More
    blog-img

    With so many workers performing tasks remotely, it’s no small wonder that authentication is one of the major points of discussion this year. How can you be sure that your company is doing all it can to verify a user’s identity before they access important information on your infrastructure? One such way you can do it is by using voice-based authentication.

    Read More
    blog-img

    When it comes to network security, there is a lot that can go wrong for your business and countless solutions that you can implement to combat them. However, there are small practices that you can implement on a daily basis to improve security as a whole, so if your collective staff can implement this one easy trick, you might be surprised by how beneficial it can be for your network’s security. This practice? Locking your computer.

    Read More
    blog-img

    Data privacy is central to most conversations in the business environment, and in a time when ransomware and hacks of all kinds are constantly receiving media presence, it’s no surprise that it is sensationalized to a certain extent. That said, it’s critical for businesses to understand what needs to be done to future-proof their data privacy infrastructures.

    Read More
    blog-img

    Many businesses have chosen to take advantage of two-factor authentication for their security needs, but there are far too many that have chosen not to. The methods might vary from organization to organization, but the general principle remains the same. We’re here to share with you how to implement two-factor authentication for three common business accounts: Microsoft, Google, and Apple.

    Read More
    blog-img

    Your privacy on the Internet matters, even if you don’t think you have anything to hide. Over the last few years, this has become more and more evident as we watch tech giants profit off of understanding the people who use their services. Facebook, Amazon, and Google are among them. Google in particular has made some recent policy changes that are worth understanding.

    Read More
    blog-img

    The Internet was always envisioned to be a network capable of sharing information across the globe—hence, the term “world wide web.” However, many online services are currently at odds with governing bodies, many business tactics and decisions impacted or even prohibited as a result. Let’s examine some of these tactics, and how the Internet has been impacted.

    Read More