Calyptix Security Releases AccessEnforcer 5.0 Beta to Add Network Authentication for Microsoft RDP and SSH Access
Charlotte, NC – Calyptix Security Corporation, maker of the AccessEnforcer® UTM Firewall, today announced the release of AccessEnforcer 5.0 Beta at CompTIA ChannelCon Online which adds GatekeeperTM and Geo Fence, … Continue reading
Risk assessments are a HIPAA requirement. Yet, seven of the nine HIPAA penalties announced this year (78%) were levied on organizations that failed to conduct one.
In this post, we explore two cases where risk assessments were not conducted, and also highlight a free resource to help smaller organizations get the job done.Continue Reading →
Ransomware attacks have changed. They’re more targeted, more dangerous, and causing more financial damage to victims than ever, according to the FBI.
See the industries hit hardest by the new rash of ransomware attacks – including examples of companies that ransomware killed. You’ll see the tactics being used and how to fight them.Continue Reading →
More cyber attacks that target managed service providers (MSPs) and other IT services have surfaced, according to new research from Symantec.
See more about the attack and how it fits into a growing number of attacks against the IT industry and its clients.Continue Reading →
Federal agencies -- including the NSA and CISA -- are alerting the public to a major security vulnerability in older versions of Microsoft Windows (pre Windows 8). Researchers fear the flaw, dubbed BlueKeep, may be used for a widespread cyber attack like the WannaCry ransomware event in 2017.
Inside, find out if you're vulnerable to BlueKeep, how to patch it, and see workarounds if you're stuck with old versions of Windows.Continue Reading →
All five of the largest data breaches reported this year by HIPAA Business Associates share one thing: they centered on email.
In some cases, the compromise of a single email account exposed the personal information of tens-of-thousands of people. See all five breaches and more inside.Continue Reading →
A new report from the U.S. Navy paints a bleak picture of the military’s cybersecurity structure – but it’s also loaded with insights you can use to help judge your own cybersecurity.
Check out the top insights of the report and see if you’re making any of the same mistakes that led to the Navy’s “significant compromises of classified and sensitive information.”Continue Reading →