Calyptix, Author at Calyptix Security Calyptix, Author at Calyptix Security
Post written by : Calyptix
Post written by : Calyptix

Calyptix Responds to NIST Small Business Cybersecurity Act

Charlotte, NC – A new federal law is expected to bring “clear and concise” resources to help small businesses protect against the growing threat of cyber attacks. Signed on Aug. 14, the NIST Small Business Cybersecurity Act requires the National Institute of Standards (NIST) to “disseminate clear and concise … Continue reading

Filed under : Press Releases
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : Press Release

4 Types of Social Engineering Used Every Day

4-Types-of-Social-Engineering-Used-Every-Day-1

Social engineering tactics are on the rise among hackers. More are calling victims and sending text messages – trying to con them into downloading remote desktop software or install malware.

See the top social engineering tactics used today in cyber crime. Raise awareness to arm yourself and your staff against phishing and con artists both in person and online.

Continue reading

Filed under : Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : top threats

HTTPS Web Filters Can Harm Your Security – Here’s How!

HTTPS-Web-Filters-Can-Harm-Your-Security-1

Did you know that some security products can make you less safe online? Researchers found one feature – HTTPS traffic inspection – almost always harms the security of people who use it.

Find out how SSL filters harm the security of millions of people every day, and also see how the HTTPS web filter in AccessEnforcer is different.

Continue reading

Filed under : Top threats
Author : Calyptix
Comment Number : 1 Comment
Tagged on : top threats

Cyber Mistakes in Healthcare: Vulnerabilities and Misconfigs.

Cyber-Mistakes-in-Healthcare-1-1

Everyone knows who to blame for a data breach – the bad guys. But what happens when one of the good guys makes a mistake? Unfortunately, the impact can be just as severe.

Check out two major threats to cyber security in healthcare: software flaws and misconfigurations. See how a coding flaw from a vendor of a fat-finger from your coworker can lead to your next HIPAA breach.

Continue reading

Filed under : hipaa
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : HIPAA
Page 1 From 15