Russian cyber gangs, Chinese state actors, the hacker group Anonymous – who is the main source of security incidents? The answer might surprise you.
See the top five actors behind security incidents in the retail and consumer industries. You’ll get stats and analysis with a description of each source.Continue reading
Mobile phones are everywhere, and they hold a growing amount of our lives and work. But are they safe for the office? Is mobile malware a real threat?
See the top four myths about mobile malware and what they mean for your security. Find out how fast the problem is growing and how to keep your phone safe.Continue reading
There is no denying it: cloud services are popular. But even if you feel that they are the best fit for your company, you should know that they do not come without risk.
See the top five risks of cloud computing, and see how sending your tasks to the sky might impact your data security, availability, and compliance.Continue reading
Free resource shows the HIPAA guidelines for IT without commentary or fluff Charlotte, NC – Calyptix Security, a leading provider of network security services for small and medium businesses, today … Continue reading
Healthcare networks took a beating last year. As they tighten security, attackers will look for new ways to steal health data – and lawyers may be the next target.
See research showing that many law firms who should comply with HIPAA don't. You will also see how you can use this trend to help protect your clients and win new ones.Continue reading
Wait, there's more! Check out the second half of our predictions for cyber security trends in 2016.
See what we expect will happen in healthcare, regulation, DDoS attacks, and more.Continue reading
New feature saves time by testing 70+ services and settings with a single click Charlotte, NC — Calyptix Security, a leading provider of network security tools for small business, today … Continue reading
2016 is here and we have a full year of cyber security news and trends ahead of us.
But what happened last year? And what does it mean for 2016? Read on to find out.Continue reading
Healthcare is the most-breached business sector, both in the number of breaches and in the number of records compromised, according to research from Gemalto.
But what are the main causes of data breaches in healthcare? What can you do to prevent them and protect your clients? We dig into Verizon’s 2015 Protected Health Information Data Breach Report to tell you.Continue reading
HIPAA is huge and confusing. The regulations are so massive that few people can point to a document and say “this is HIPAA.”
But if you’re an IT service provider, we have narrowed down the parts of HIPAA that matter to you. You can see them in this document. The text in this PDF comes straight from the Code of Federal Regulations, the only official source of the HIPAA guidelines.Continue reading