Complete this form and a link to view the webinar will be emailed to you


On-Demand Webinar

Contact Us: 877-227-5054

What would you do if all of your business data was lost because you fell victim to a cyberattack? Would you cry?

It could happen to any business, large or small. On any given day, cybercriminals could find their way into your network or systems and attempt to damage or destroy them. Join us for this webinar and see how one business executive was able to recover from a cyberattack and wipe away those tears.

In this webinar, you’ll learn about the business impact of cyberattacks and what you can do to prevent them and protect your organization. As a business executive, you have a responsibility keep your business information systems safe, reliable and secure. In this webinar we’ll discuss the five key steps you should take to protect your organization from cyberattacks. We’ll also discuss:

What is a cyberattack?
Who is behind these attacks?
What can businesses do to prevent cyberattacks?
What can individuals do to protect themselves from a cyberattack?

© 2017 mindSHIFT Technologies, Inc. a wholly owned subsidiary of Ricoh USA, Inc. | Privacy Policy | 877-227-5054

When Grown Men Cry: Cyberattacks and How To Prevent Them



Roadmap to HIPAA Compliance

© 2017 mindSHIFT Technologies, Inc. a wholly owned subsidiary of Ricoh USA, Inc.
Privacy Policy | 877-227-5054

During this webinar, you’ll learn how to protect your organization from the daily onslaught of email security threats.

Organizations are at a growing risk for data breaches and reports of theft or the inappropriate distribution or storage of electronic health information grow daily. Violations come with stiff penalties.

Compromised personal data can result in fines ranging from thousands to millions of dollars. As a business in the healthcare industry, you know you need to be HIPAA compliant, but how? Where do you start?

This webinar will cover:

  • What is HIPAA?
  • Does HIPAA apply to me?
  • A summary of the HIPAA Security, Privacy and Breach Notification Rules
  • The importance of Business Associate Agreements
  • Compliance in the Cloud
  • Where do I start?
  • Roadmap to compliance
Fix the following errors: