Category: Security
-
ITIL 4® Foundation was issued by AXELOS to Wylie Blanchard
View my verified achievement from Axelos. ITIL® Foundation Certificate in IT Service Management (ITIL 4 Edition) was issued by AXELOS to Wylie Blanchard on December 25, 2022. ITIL® 4 Foundation demonstrates this individual understands the key concepts of IT and digital service delivery including the key concepts, guiding principles and practices of ITIL® 4 for service management. They…
-
The Value of Multi-Factor Authentication
Multi-Factor Authentication (MFA) is an authentication form that contains a layered approach to securing access whereby the system requires a user to present a combination of two or more different authenticators to verify a user’s identity for login. This is part of a core component of the Identity and access management policy. It increases security…
-
The Importance of Health Information Exchange
The security of your medical information has never been more important than it is today. The creation of secure electronic data transfer on a wide scale is undeniable, but many Americans still have their personal information stored within the paper filing systems of their doctor’s offices in numerous different locations. Currently, this health care information…
-
Why Nonprofits Need Zero Trust Security in 2021
There is no such thing as having too much network security! This is the mindset you should have when you consider implementing Microsoft’s Zero Trust Security systems into your daily design strategy. As your organization continues to grow, more people will gain access to the information that is central to the success of your work.…
-
Access your Cloud PC & Business Apps from anywhere and on any device with Windows 365 and Microsoft 365
Windows 365 is a subscription service offered by Microsoft and designed to deliver a full cloud-based PC experience to any device, and empower organizations and their staff. It also provides security and simplicity for modern hybrid work. Microsoft 365 features the familiar office suite programs (such as word and excel), cloud-based software-as-a-service products and more.…
-
5 cloud security concepts that non-technical technology professionals should understand
I recently had a conversation with colleagues who work in roles related to Cloud Technology but not in a technical capacity. Our conversation focused on Cloud Security – why it is important and what key concepts they should understand. Why it is important. For those working with Cloud Technology, but not in a technical capacity,…
-
Trust in Digital Wallets
Below is my response to an assignment associated with the online course, The Digital Marketing Revolution, by the University of Illinois at Urbana-Champaign. It was an intriguing chance to use a practical case to illustrate the idea of digital dominance. Assignment Purpose. This assignment is intended to provide students with the chance to use a practical…
-
PCP Member Eligibility Secure Email
Automated, Hippa Compliant, system to email member eligibility lists to Primary Care Physicians. Trizetto’s QNXT™ Enterprise Core Administration System & ASM’s MD-Staff – Credentialing. Created an automated, HIPAA compliant, process to securely batch and distribute member eligibility lists to PMG/non-Presence PCP’s on a monthly basis via individual PCP email addresses.Utilizing SQL, SSIS, & C#,: Trizetto’s…
-
Remote DBA – Database Administration: @ SpiceWorks
Remote SQL Server Administration Managing several versions of MS SQL Server 2005-2014 Also managing Oracle 11g Managing and maintaining databases and servers for multiple clients – backups, log shipping, replication, mirroring, Always On availability groups, and clustering. Configuring and troubleshooting multiple versions of MS SQL Server – 2005, 2008, 2008 R2, 2012, 2014. Performing migrations,…