Top 10 Malicious Site Hosts, Countries, and File Types
The war against malware and malicious websites never ends. But with a little intel and some firepower, your team can keep your office and your clients safe.
See the top 10 ISPs that host the most malware. Also find out which countries are rising in the malware market and which file types to watch out for.
Continue readingPCI DSS: Easier and cheaper compliance with SAQs
Pretend PCI DSS compliance is a highbar. How you handle cardholder data will determine whether you have to throw a small, light portion of your network over the bar or the whole hulking mass of it.
IT service providers can make compliance easier -- but how?
Continue readingIT Providers Get Help with PCI DSS Compliance
Charlotte, NC – Calyptix Security Corp., a leading provider of network security and management solutions for small and medium-size businesses, today announced a new report to help IT service providers … Continue reading
Top 10 Security Vulnerabilities of 2013
The top cause of security vulnerabilities are outdated and unpatched systems. See the data to prove it, and know which types of systems are more commonly out of date.
Inside you'll see the top 10 external security vulnerabilities, the top 10 internal vulnerabilities, and the most common causes, all found in the 2014 Global Threat Intelligence Report.
Continue reading4 Security Insights via 2014 Verizon Data Breach Investigations Report
This year's Verizon Data Breach Investigations Report has a lighter tone, but its data and analysis are as sobering as ever.
Get insights and charts from the report, and see which types of security incidents happen most often in your clients' industries.
Continue readingNew HIPAA Resource Helps IT Service Providers
Charlotte, NC – Calyptix Security Corp., a leading provider of network security and management solutions for small and medium-size businesses, today announced a new resource that highlights important regulations that … Continue reading
HIPAA Hazards: Avoid the business associate trap
IT providers, do you have clients in healthcare? Do you handle their patient data? If yes, then you are almost certainly required to protect that data by HIPAA.
HIPAA calls this data “electronic protected health information,” or ePHI. Essentially, it is electronic information about a patient. It can be anything from a patient’s phone number to a recent diagnosis.
HIPAA requires healthcare organizations to protect this data. It also requires their “business associates” to protect it – and that includes their IT service providers.
Continue readingManaged Services Provider Increases Profits with New Security Vendor
Charlotte, NC – Calyptix Security, a leading provider of network security and management solutions for small and medium-size businesses, today announced a powerful way for managed service providers to increase … Continue reading
Top Threats: Heartbleed Bug in OpenSSL
Heartbleed is a major security flaw discovered in certain versions of OpenSSL. The bug can allow attackers to eavesdrop on communications, impersonate users, or steal data thought to be encrypted and secure. Continue reading
Top Threats: Massive denial-of-service attacks
DDoS attacks are nothing new, but the storms of traffic they use to drown targets in 2014 have grown into hurricanes. Continue reading