Top 5 Sources of Security Incidents in Retail

by Calyptix, April 13, 2016

computer-security-incident-oops

Russian cyber gangs, Chinese state actors, the hacker group Anonymous – who is the main source of security incidents? The answer might surprise you.

See the top five actors behind security incidents in the retail and consumer industries. You’ll get stats and analysis with a description of each source.

Continue reading

Filled under : pci dss , Research
Tagged on : PCI DSS , research , retail

Mobile Malware: 4 Biggest Myths and How to Stay Safe

by Calyptix, April 8, 2016

Everything-is-fine-office-cloud-fire

Mobile phones are everywhere, and they hold a growing amount of our lives and work. But are they safe for the office? Is mobile malware a real threat?

See the top four myths about mobile malware and what they mean for your security. Find out how fast the problem is growing and how to keep your phone safe.

Continue reading

Filled under : Malware , Top threats
Response: 2 Comments
Tagged on : malware

Top 5 Risks of Cloud Computing

by Calyptix, March 17, 2016

Everything-is-fine-office-cloud-fire

There is no denying it: cloud services are popular. But even if you feel that they are the best fit for your company, you should know that they do not come without risk.

See the top five risks of cloud computing, and see how sending your tasks to the sky might impact your data security, availability, and compliance.

Continue reading

Filled under : Research
Tagged on : research

HIPAA Compliance Ignored by Healthcare Lawyers

by Calyptix, February 8, 2016

healthcare-lawyers-ignore-hipaa

Healthcare networks took a beating last year. As they tighten security, attackers will look for new ways to steal health data – and lawyers may be the next target.

See research showing that many law firms who should comply with HIPAA don't. You will also see how you can use this trend to help protect your clients and win new ones.

Continue reading

Filled under : hipaa , Regulations
Tagged on : healthcare , HIPAA

2016 Predictions for Small Business Cyber Security (Part 2 of 2)

by Calyptix, January 20, 2016

small-business-cyber-security-predictions

Wait, there's more! Check out the second half of our predictions for cyber security trends in 2016.

See what we expect will happen in healthcare, regulation, DDoS attacks, and more.

Continue reading

Filled under : Research

2016 Predictions for Small Business Cyber Security (Part 1 of 2)

by Calyptix, January 11, 2016

smb-security-predictions-2016

2016 is here and we have a full year of cyber security news and trends ahead of us.

But what happened last year? And what does it mean for 2016? Read on to find out.

Continue reading

Filled under : Research

Top 3 Causes of Health Data Breaches

by Calyptix, December 22, 2015

Top-health-data-breach-incident-patterns

Healthcare is the most-breached business sector, both in the number of breaches and in the number of records compromised, according to research from Gemalto.

But what are the main causes of data breaches in healthcare? What can you do to prevent them and protect your clients? We dig into Verizon’s 2015 Protected Health Information Data Breach Report to tell you.

Continue reading

Filled under : hipaa
Tagged on : healthcare , HIPAA

HIPAA Compliance for IT: The regulations you need

by Calyptix, December 3, 2015

HIPAA-regulations-for-it-compliance-cover

HIPAA is huge and confusing. The regulations are so massive that few people can point to a document and say “this is HIPAA.”

But if you’re an IT service provider, we have narrowed down the parts of HIPAA that matter to you. You can see them in this document. The text in this PDF comes straight from the Code of Federal Regulations, the only official source of the HIPAA guidelines.

Continue reading

Filled under : hipaa , Regulations
Tagged on : HIPAA
Page 1 From 8