Welcome to the Athreon Blog

Law Enforcement Speech Recognition Cybersecurity Research Legal Medical Transcription Medical Scribes Insurance Finance Business Media

Cryptocurrency Scams

2 years ago

Cryptocurrency Scams   Personally identifiable information, or PII, is the end goal for every cybercriminal because it can grant them…

Romance Scams – Beware of Counterfeit Casanovas

2 years ago

Romance Scams – Beware of Counterfeit Casanovas   Do you use Facebook, Hinge, or Tinder? Are you on eharmony, Match,…

Front-End Speech Recognition – Advantages & Considerations

2 years ago

Front-End Speech Recognition – Advantages & Considerations   If your organization is seeking to lower clinical documentation costs, lessen data…

Unintentional Insider Threats

2 years ago

Unintentional Insider Threats   We typically think of threats to our organization as external forces. These can be hazards coming…

What Threats May Be Lurking Inside Your Business?

2 years ago

What Threats May Be Lurking Inside Your Business?   Not all those that seek to harm our businesses come from…

How to Protect Against Insider Threats

2 years ago

How to Protect Against Insider Threats   It’s critical to protect against insider threats, and it’s a team effort. Insider…

Phone Scams – Know How to Protect Yourself

2 years ago

Phone Scams – Know How to Protect Yourself   Do you ever get unsolicited calls about your car warranty expiring?…

What’s The Dark Web

2 years ago

What’s The Dark Web   You’ve probably heard of the Dark Web with so many data breaches in the news.…

SLAM Mnemonic – M Is for Message

2 years ago

SLAM Mnemonic – M Is for Message   As we reach the final installment in exploring the SLAM method for…