Blog

July 27, 2022 | by OnPage Corporation
Zero Trust Security

Zero Trust Security: Key Concepts and 7 Critical Best Practices

What is Zero Trust? Zero trust is a security model to help secure IT systems and environments. The core principle of this model is to never trust and always verify. It means never trusting devices by default, even those connected to a managed network or previously verified devices.  Modern enterprise environments include networks consisting of … Continued

read more
July 26, 2022 | by OnPage Corporation
What is a Secure SDLC?d

What Is a Secure SDLC?

What Is a Secure SDLC? The Software Development Lifecycle (SDLC) framework defines the entire process required to plan, design, build, release, maintain and update software applications, including the final stages of replacing and decommissioning an application when needed. A Secure SDLC (SSDLC) builds on this process, integrating security at all stages of the lifecycle. When … Continued

read more
July 13, 2022 | by James Truslow
MSPsd

How MSPs Can Provide Irreplaceable Value in Uncertain Times

If you have been following the financial news lately, you have surely become all too familiar with the challenging economic conditions that have emerged in 2025. Though the primary concern in the media is how a recession will affect consumers, the impact on businesses must also be considered. As financial shocks and geopolitical turmoil put … Continued

read more
July 13, 2022 | by James Truslow
Marriott Data Breach

What IT Pros Can Learn from the Marriott Data Breach

Despite the best efforts of individuals to protect their own data, they cannot always account for the cybersecurity shortcomings of larger organizations such as their employers, financial institutions, and healthcare providers entrusted with their personal information. Recently, it was made painfully apparent that hotels should also be added to this list of vulnerable entities based … Continued

read more
June 24, 2022 | by OnPage Corporation
data breach incident response

Developing a Data Breach Incident Response Plan

With cybersecurity boundaries going beyond the traditional walls of an office and attack surfaces constantly expanding, data breaches are inevitable. Managing risks from data breaches requires organizations to develop a comprehensive incident response plan – an established guideline that facilitates incident detection, response and containment, and empowers cybersecurity analysts to secure a company’s digital asset. … Continued

read more
June 21, 2022 | by Ritika Bramhe
EHR alerts

3 Effective Ways to Enhance Patient Safety with EHR Alerts

Hospitals that adopt electronic health records (EHR) to optimize clinical workflows face the decision of how to integrate EHR alerts into their workflows. The rationale is to surface actionable data from EHR systems and present healthcare providers with this information to supplement their day-to-day clinical decisions.  Though providers gain immense value from EHR alerts that … Continued

read more
June 17, 2022 | by James Truslow
Incident Response Plan

Choosing the Right Notification Tool for Incident Response Plan

Incident Response Plan – Introduction Is your IT team ready to respond to an increasing volume of data security incidents? According to the CrowdStrike 2024 Global Threat Report, cloud intrusions increased by 75%. The most recent Cost of a Data Breach report from IBM shares the Ponemon Institute’s finding that the average data breach is … Continued

read more
June 10, 2022 | by Ritika Bramhe
communication in nursing

Driving Effective Communication in Nursing

Effective communication in nursing is central to providing top-quality patient care. Nurses communicate with patients to understand their health issues, and they provide them with the care and compassion needed for recovery. Accomplishing effective communication with patients directly impacts patient health outcomes, and it has far-fetched implications when carried out ineffectively. As such, effective communication … Continued

read more
June 10, 2022 | by James Truslow
Incident Response Systemd

Crossing “The Last Mile” with an Incident Response System

IT Teams Are Losing in the “The Last Mile” For IT organizations, the last mile is the all-important final communication relaying automated notifications of system failure to the human team members who can solve them. Despite advances in monitoring technology, your IT team could still be losing in the last mile without an incident response … Continued

read more
June 3, 2022 | by Ritika Bramhe
xmatters alternatives

Evaluating xMatters Alternatives in 2024 (Updated)

(Blog Updated on July 22, 2024): Seconds count when mission-critical IT systems break down. Customers are accustomed to seamless experiences, and any impact on the end-user experience due to system breakdown can drive them away. In parallel, the digital technology estate is becoming increasingly complex as organizations continue to grow their tech stack to bring … Continued

read more

OnPage