Calyptix, Author at Calyptix Security - Page 17 of 17 Calyptix, Author at Calyptix Security - Page 17 of 17
Post written by : Calyptix
Post written by : Calyptix

Top 10 Security Vulnerabilities of 2013

top-10-external-security-vulnerabilities

The top cause of security vulnerabilities are outdated and unpatched systems. See the data to prove it, and know which types of systems are more commonly out of date.

Inside you'll see the top 10 external security vulnerabilities, the top 10 internal vulnerabilities, and the most common causes, all found in the 2014 Global Threat Intelligence Report.

Continue reading

Filed under : Research
Author : Calyptix
Comment Number : 2 Comments
Tagged on : research , vulnerabilities

HIPAA Hazards: Avoid the business associate trap

HIPAA Hazards

IT providers, do you have clients in healthcare? Do you handle their patient data? If yes, then you are almost certainly required to protect that data by HIPAA.

HIPAA calls this data “electronic protected health information,” or ePHI. Essentially, it is electronic information about a patient. It can be anything from a patient’s phone number to a recent diagnosis.

HIPAA requires healthcare organizations to protect this data. It also requires their “business associates” to protect it – and that includes their IT service providers.

Continue reading

Filed under : Regulations
Author : Calyptix
Comment Number : 1 Comment
Tagged on : business associate , HIPAA

Marketing Tools: 10 Small Businesses Hit by Hackers

debtHacked small businesses are rarely in the news. Your SMB clients might hear about the breach at Target, but they never hear about the local auto dealer who lost more than $20,000 to cybercrime. This gives SMBs a false sense of security. They think they are too small for hackers to bother. The truth is that they are breached far more often than large firms. Continue reading

Filed under : Marketing
Author : Calyptix
Comment Number : No Comment Yet

Top Malware Sites and Unsafe Servers

Hornets-nest-thumbnail[1]

Malware sites increasingly use services like Google and GoDaddy for hosting. The Washington Post even called Amazon a “hornet’s nest of malware."

These trends and others are described in the SERT Quarterly Threat Intelligence Report Q4 2013. We dig through the report to give you the top malware sites, hosting providers, and more to watch out for.

Continue reading

Filed under : Malware
Author : Calyptix
Comment Number : 4 Comments
Page 17 From 17