Calyptix Blog

Password Security: How to thwart hackers with a strong password

by Calyptix, November 28, 2016

Strong Password Security 1

Passwords are often the only barrier between your data and malicious actors. But many users continue to use weak passwords like “123456”, putting their data and companies at risk.

See how attackers will try to steal your password, and see how to stop them, in this post on strong password security.

Continue reading

Filled under : Malware , Top threats
Tagged on : malware , top threats

New Types of Malware May Be Hiding in Your Network

by Calyptix, November 21, 2016

Types of Malware 1

Malware is no strange foe to network security. But a few new tactics are raising eyebrows, such as “blastware” that destroys the systems that flag it as a threat.

See examples of new types of malware threats and what you can do about them. You’ll get a list of tips to help keep your clients safe.

Continue reading

Filled under : Top threats
Tagged on : top threats

3 Common DNS Attacks and How to Fight Them

by Calyptix, November 14, 2016

DNS attack

DNS attacks can shake the foundation of your network and even disrupt huge chunks of the internet. Just last month, a single day of attacks blocked access to sites like Netflix and Twitter for thousands of people.

How can DNS attacks harm your network? Find out in this post, and see three common types of DNS attacks and how to prevent them.

Continue reading

Filled under : Top threats
Tagged on : top threats

HIPAA Violation Cases May Hit Record in 2016

by Calyptix, November 7, 2016


Why is the healthcare industry at such high risk for data breaches? Because they have a lot of loot, and the lock on the gate has been rusty for years

We dig into data on the latest health care data breaches to show you the trends for 2016. See why this year is on pace to match the industry record for number of breaches reported.

Continue reading

Filled under : hipaa

SSL VPN and IPsec VPN: How they work

by Calyptix, November 2, 2016


Virtual private networks are a great tool to use when building your business’s network security plan. So what options do you have?

The two most common VPN types are SSL VPN and IPsec VPN. Read on to see how they measure up to your company’s needs.

Continue reading

Filled under : Research

Types of Web Filters and How They Can Work for Your Clients

by Calyptix, October 17, 2016

Types of Web Filters 1

Web filtering is one of the most widely available network security tools. Out of the many varieties, do you know which will work best for your clients?

Read on to familiarize yourself with the most common types of web filters around.

Continue reading

Filled under : Top threats
Tagged on : top threats

Smaller HIPAA Breaches Under Scrutiny

by Calyptix, October 10, 2016

OCR Enforces Data Breaches

In August 2016, the Office of Civil Rights (OCR) notified Covered Entities and Business Associates that it is widening its efforts to identify protected health information (PHI) breaches that affect less than 500 individuals.

While expensive news for businesses, it is a ripe opportunity for IT providers to deliver valuable cybersecurity services to new and existing clients. Read on to see how your company could benefit.

Continue reading

Filled under : hipaa
Tagged on : HIPAA

Types of Firewalls: The Good, the Minimal, and the Effective.

by Calyptix, September 26, 2016

types of firewalls 1

Firewalls are great tools to use for network protection, especially if your business is regulated by laws such as HIPAA and PCI DSS.

But which types of firewalls are the most beneficial for your clients' business?

Continue reading

Filled under : Top threats
Tagged on : top threats
Page 1 From 10


Follow us