Blog

Top Tech Gift Guide for 2019

Here at BEI, we polled our staff and as you can imagine, a group of techies have a large and interesting wish list.

Blog

Spotting Phishing in 2020 –Presented by The Reston Chamber

We want you to join us for this special presentation about phising and the dangers to look out for in 2020. Katherine Deming from BEI will be presenting this topic.

Blog

Holiday Shopping Primer & Online Scams

Whatever your holiday traditions, the experts advise us all to be a little wary online this time of year. Here are some easy tips to stay safe:
Holding the door for hacker

Blog

Hacking Prevention - don't be a Hacker Helper

Cybercriminals are always on the hunt for easy access to your organization. Many times the easiest way in isn’t traditional hacking. Human hacking, more commonly known as social engineering, involves tricking an unsuspecting employee into giving hackers the access they need.

Blog

The Dark Web - A Scary Story

The Dark Web sounds frightening and it is. It is a place most of us will never visit – it can’t be reached via normal search engines such as Google or Bing.
Golf club and golf ball

Blog

2019 Reston Cup - Presented by The Reston Chamber

It’s the 2nd annual Greater Reston Chamber golf tournament at Hidden Creek Country Club on Monday, October 21 from 11am – 8pm (includes dinner).
Leads the way to compliance

Blog

So You Signed a BAA: Are You Ready for HIPAA Fines?

We're hosting this breakfast seminar on "HIPAA Compliance for the Business Associate" at our office on Wednesday, October 23 and we'd love to see you there.
Cloud File Storage Solutions Breakdown--so many choices and paths you can choose

Blog

Laptop Encryption for HIPAA Compliance

Arthritis and Rheumatism Associates (ARA) is a large healthcare practice based in Maryland. With approximately 20 physicians and more than 200 staff, ARA manages an extensive IT infrastructure.Successfully managing and encrypting these myriad devices is critical to ensuring good business practices.

Blog

PCI Validated P2PE – The Simple and Safe Path to PCI Compliance

Many of our clients take payments from their customers using…

Blog

Mr. Jennings Goes to Washington…

We’re all targets for phishing, and you can imagine how attractive the Senate staffers would be! Mike briefly covered the various types of phishing, including Credential, Spear, Whaling and Business Email Compromise. He included examples and discussed how to spot each type.