NCX Group now has its own channel on Blog Talk Radio. We are currently sharing the best of The Watchdog Report series covering topics like InfoSec and more. You can…
It’s been seven years since Hurricane Katrina changed the lives of Gulf Coast residents on August 29, 2005. The aftermath of Katrina left thousands homeless. But, it also created chaos…
Over the last 6 months CEO’s, Executive Boards, and Small Business Owners alike have been making Strategic Plans for a Romney Victory and for the Re-Election of President…
Although network security and information security are the new sexy terms in information technology, they are not the only terms to consider. Business continuity may be the non-sexy sister, but…
The role of the Chief Security Officer, or CSO, has evolved as information security has reached a higher state of concern over digital threats, such as systems hacking, viruses, and coordinated security…
Since the introduction of the HITECH Act in 2009, the business of protecting patient data has reached a level of critical importance. With severe civil and criminal consequences, HIPAA…
Medical identity theft occurs when a patient’s personal medical information is stolen and used by a thief to fraudulently receive health care services. Medical identity thieves can use patient information to…
Part of any business model includes the expectation that if money is invested, a return on the investment can be measured by how it impacts your bottom-line. However, understanding the…
2012 marks the ten year anniversary of NCX Group Inc. In 2002, CEO and founder Michael Fitzpatrick saw up close the struggles of over 80% of the Fortune 500 companies…
Guest Post by NCX Group Contributor Anthony M. Freed In an increasingly outsourced marketplace, third-party service providers offer companies multiple benefits, including marked savings on hardware outlays and support personnel,…
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.