CDML Computer Services - We make sure your BITS don't BYTE!       CALL: +1 718-393-5343
The Dangers of Sharing Email and Cloud Accounts

The Dangers of Sharing Email and Cloud Accounts

Watch or listen to our Blogcast HERE. In small and medium-sized businesses, it’s common to share email and cloud accounts.

Understanding New York’s Updated Data Breach Law

Understanding New York’s Updated Data Breach Law

What Every Business Must Know—Especially in Finance and Healthcare View/listen to our blogcast here. In today’s digital landscape, data breaches.

Recent Telecom Breaches Highlight the Need for Secure VoIP

Recent Telecom Breaches Highlight the Need for Secure VoIP

A wave of cyberattacks attributed to a state-sponsored threat group known as “Salt Typhoon” (also tracked as Earth Estries, FamousSparrow,.

Lessons From a Long Haul: Ransomware Attack on a Richmond University Medical Center in NY

Lessons From a Long Haul: Ransomware Attack on a Richmond University Medical Center in NY

In 2023, a well-known New York hospital fell victim to a significant ransomware attack, ultimately affecting the personal data of.

HIPAA Cybersecurity Revisions: What Medical Practices Need to Know

HIPAA Cybersecurity Revisions: What Medical Practices Need to Know

As a medical practice owner or manager, complying with HIPAA regulations is crucial for protecting patient data and avoiding hefty.

Navigating Compliance for Medical Providers in New York Part 2 of 2

Navigating Compliance for Medical Providers in New York Part 2 of 2

How CDML Can Help Providers Achieve Compliance In Part 1 of this series, we explored the key technology-related requirements of.

Navigating Compliance for Medical Providers in New York Part 1 of 2

Navigating Compliance for Medical Providers in New York Part 1 of 2

A Guide to HIPAA, NY SHIELD Act, and PCI Regulations Medical providers in New York face a complex web of.

Compliance and Security

Compliance and Security

Part 5 of 5: Comprehensive Compliance and Security with CDML With the increasing complexity of cybersecurity threats, achieving and maintaining.

Preparing for the Unthinkable

Preparing for the Unthinkable

Part 4 of 5: Disaster Recovery (DR) and Incident Response (IR) Plans For financial firms, the ability to respond effectively.

Strengthening Cybersecurity

Strengthening Cybersecurity

Part 3 of 5: Risk Management, Encryption, and Continuous Monitoring For financial organizations, securing sensitive client data requires more than.