CISA Updates the #StopRansomware Guide: Here’s What’s New

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and its partners recently released an update to their #StopRansomware guide, first issued in 2020. The revised version reflects the ever-shifting scene of tactics and malware that have made the battle against ransomware a moving target. Fun fact: The first ransomware attack was delivered via floppy disk […]
QR Code Scams – Spotting Them and Protecting Yourself

The list of ways that hackers are trying to separate you from your money or your data is seemingly endless, and now you can add the QR code to that list. The use of malicious codes has spiked in recent months, and the consequences can be dire. Here’s what’s happening and how to avoid being […]
Should the U.S. Government Ban TikTok? Should You?

With all the news about the United States government’s potential ban of TikTok and the ensuing congressional hearings, you might be wondering whether you should disallow use of the app within your business network. With 150 million U.S. TikTok users and a raft of cybersecurity concerns, it’s a valid question. Let’s acknowledge that the questions […]
<strong>Hill Tech Founder Ron Hill Receives Cyber-AB Registered Practitioner Certification</strong>

Ron Hill, Founder and President of Hill Tech Solutions, has been awarded the Cyber-AB Registered Practitioner (RP) certification. Based on implementation of the Cybersecurity Maturity Model Certification (CMMC; see our recent post on CMMC 2.0 here), the RP certification recognizes that “there is a demand for individuals and companies who understand CMMC, who are invested in […]
<strong>HIPAA Rule Changes for 2023</strong>

The Health Insurance Portability and Accountability Act, better known as HIPAA, has been with us for more than a quarter century now. Enacted in 1996, HIPAA’s original intent was to increase the number of Americans with health coverage and to make health care delivery more efficient. Much of that original intent, of course, was supplanted […]
<strong>CMMC 2.0 – What You Should Know</strong>

If you’re a government contractor, you’re familiar with the Cybersecurity Maturity Model Certification (CMMC), developed by the Department of Defense (DoD) to create environments conducive to safeguarding government information. Now, a new CMMC iteration is on the way. Here’s what you need to know. CMMC history While the history of CMMC dates to 2010, it […]
Cybersecurity Year in Review: Looking Back at 2022 and Ahead to 2023
We’re always looking for good news on the cybersecurity front, and midway through 2022 it seemed there might actually be some. A report from Sonicwall noted that ransomware attacks were down 23% through the first half of the year, a substantial decrease. Was the world actually making some progress in the ongoing struggle? Upon a […]
Hill Tech Principal Consultant Ron Hill Earns CISSP Certification
Ron Hill, Founder and Principal Consultant of Hill Tech Solutions, has earned the Certified Information Systems Security Professional (CISSP) designation. Established by the International Information System Security Certification Consortium (ISC)2, the CISSP certification is recognized worldwide as the most esteemed cybersecurity certification in the profession. This is in part because of its emphasis on not […]
Hill Tech Solutions Again Ranked Among Elite Managed Service Providers on Channel Futures 2022 NextGen 101 List
The NextGen 101 List Honors Partners Building MSP Practices JUNE 16, 2022: For the third consecutive year, Hill Tech Solutions has been named as one of the world’s premier managed service providers on the prestigious Channel Futures 2022 NextGen 101 rankings. The NextGen 101 list honors industry-leading managed service and technology providers who are driving […]
White House Advisory on Cybersecurity
While the human suffering associated with Russia’s invasion of Ukraine has deservedly taken most of the headlines, the fact remains that the conflict is taking place in a part of the world known as a hotbed for ransomware and other cyber threats. The potential threat to American businesses is very real, to the extent that […]