Small businesses take note: denial-of-service attacks continue to grow in strength and hundreds of thousands are launched each month.
See the latest trends in DDoS attacks – including two record-breakers this year that shocked security researchers.Continue reading
Everyone knows who to blame for a data breach – the bad guys. But what happens when one of the good guys makes a mistake? Unfortunately, the impact can be just as severe.
Check out two major threats to cyber security in healthcare: software flaws and misconfigurations. See how a coding flaw from a vendor of a fat-finger from your coworker can lead to your next HIPAA breach.Continue reading
Charlotte, NC – Calyptix Security today added another voice-over-IP (VoIP) phone service to the list of those supported by the company’s flagship product, AccessEnforcer UTM Firewall. RingCentral is the latest … Continue reading
Email is an old channel, but it remains one of the most popular for cyber attacks. This is true in many industries, and especially in healthcare.
See why email remains the top location of HIPAA data breaches, and see other types of breaches that – while fewer in number – cause far more harm.Continue reading
New vulnerabilities are discovered every week – some silly and some severe. Knowing which are the most dangerous depends on several factors, including the popularity of the flaw among data thieves.
See the top 10 vulnerabilities in exploit kits in 2017. We list and describe each security flaw and also explain why Adobe products no longer dominate the top 10.Continue reading
See the latest research on the top threats to medical IT systems and data Charlotte, NC – Calyptix Security today published the first-ever edition of the Healthcare Threat Report, an … Continue reading
A nasty strain of malware has infected hundreds of thousands of routers – and it’s worse than initially thought.
See who is vulnerable to VPNFilter, how it works, and who might be responsible for launching it.Continue reading
Charlotte, NC - Calyptix Security Corp. today published a technical report in response to warnings of a Russian cyber attack on network infrastructure devices across the globe. In the report, Calyptix describes the attack and its impact on the company’s flagship product, AccessEnforcer UTM Firewall.
The Verizon DBIR is one of the most respected cyber security reports published each year – but can you trust the data?
See errors we found in the new 2018 edition of the DBIR. Decide for yourself if the report is trustworthy.Continue reading