Chances are you can name four or five types of network attacks – but which are the most common? And which are you most likely to see on one of your networks?
In this post, we show the top 7 types of network attacks worldwide during the first quarter of 2015. You’ll see the list and description for each type.Continue reading
HIPAA is huge. Out of its hundreds of pages, only a small portion apply to IT. How do you find the rules that matter?
The most important section of HIPAA for IT is the Security Rule. Even within this portion there is a ton of irrelevant information. In this post, we cut through the clutter and show you the parts of HIPAA that affect IT most.Continue reading
Did you think you crossed the PCI DSS finish line? Unfortunately , the rules have changed. Only a few months after the Jan. 1 deadline to comply with PCI DSS 3.0, the PCI Council released a new version and said it was effective immediately.
In this post, see the changes in the new PCI DSS 3.1. You’ll see the requirements most affected by the update and why you may need a “risk mitigation and migration” plan to stay compliant.Continue reading
You’ve heard about the massive data breaches at hospitals and health insurers – but what about their business associates? Are IT providers seeing similar attacks? And are the attacks successful?
In short: yes. Find out more about the growing number of attacks on healthcare business associates. See the top causes of data breaches and the most-targeted types of data.Continue reading
The average cost of a cyber attack on a small business is more than $20,000 – and that’s just the average. Since the number of breaches shows no sign of slowing, it might be the right time to consider a cyber insurance policy for your business.
Find out if cyber insurance is right for your company in this post. We’ll show you what a cyber policy typically covers, and you’ll get tips for finding the right policy in the market.Continue reading
Includes a free AccessEnforcer UTM firewall device and a free month of unlimited service for ASCII members Charlotte, NC – Calyptix Security, a leading provider of network security and management … Continue reading
Denial-of-service attacks continue to grow in frequency and size. But are all DDoS attacks the same? And what motivates people to launch one of these attacks?
Find answers to these questions and more in this post. You’ll also see the most common types of tools and targets for application-layer attacks.Continue reading
See which threats are growing fastest, which industries are targeted the most, and how one in four data breaches last year hit a POS system.
You’ll get this and more in our summary of the Verizon 2015 Data Breach Investigations Report. The report is a whopper at 60+ pages. We highlight our 10 favorite charts to get you up to date and save you time.Continue reading
Health IT departments are looking to make big investments in 2015. If you know their plans and concerns, you can beat the competition and offer the services your clients want most.
Find out how health IT departments are planning to spend their technology budgets this year. You’ll see why security is a major priority, and how mobile technology is predicted to continue expanding.Continue reading
Focusing your marketing and sales efforts on a niche can be a great way to accelerate growth at your IT business. Once you land your first client, your second, third, and fourth can be just a referral away.
One Calyptix partner has had great success selling in the market for dental IT and integration. Read on to see his tips and secrets for breaking in.Continue reading