HIPAA Breach Statistics: Stolen Record Count Plunges
If you saw only the headlines, you might think healthcare had a terrible year in cyber security – maybe worse than ever. But a new report shows, in many ways, the industry gained ground last year.
See highlights of the newest stats on data breaches in healthcare. See where more work is needed and get a few talking points to share with your clients.
Continue readingSpectre and Meltdown: Nothing is Certain
Two massive chip vulnerabilities are here and the security industry is scrambling for answers. Misinformation is everywhere, and even the patches are wreaking havoc.
Find the answers to your questions on Spectre and Meltdown in this post. You’ll see the problem, the solution, and know which rumors are fake news.
Continue readingAccessEnforcer 4.0 Announced by Calyptix Security
Biggest Software Release in Nearly 10 Years for AccessEnforcer UTM Firewall Charlotte, NC – Calyptix Security Corp., maker of the AccessEnforcer UTM Firewall, today announced a revolutionary update to the … Continue reading
Biggest Cyber Attacks 2017: How They Happened
Another year of cyber attacks is almost behind us. We’ve seen global ransomware epidemics, destructive lone-wolf hackers, and the tripling of the worst data breach ever reported.
Join us for a review of the top attacks in 2017. You’ll see how they happened so you can avoid making the same mistakes.
Continue readingHealthcare IT Security: Top Stories of 2017
Healthcare IT and HIPAA compliance had a big year in 2017. Now you can catch up on the biggest stories with this post.
See the top stories in healthcare IT security for the year. We cover ransomware attacks, record-breaking HIPAA fines, and more.
Continue readingMobile Security Threats to Your Network: Top 7 and Tips
Did you know mobile devices can be exposed to more security threats than desktops? Makes you wonder – how many smartphones are on your network right now?
In this post, you’ll see the top network security threats of mobile devices and how to manage them to protect your network.
Continue readingIs Port Scanning Legal? Answers for IT Companies
Port scanning is almost as common as sending an email. IT companies do it every day – but so do hackers. So is port scanning legal?
Find the answer – and see how to protect your IT company from lawsuits stemming from port scans.
Continue readingHealthcare: Top 5 Web Application Attacks in 2017
Web applications are booming in healthcare – unfortunately, their security standards need a checkup and may require surgery.
See the top five types of web application attacks in healthcare during Q2 2017. You’ll get an overview of the types and how they compare to other target industries.
Continue readingTop 8 Network Attacks by Type in 2017
Every year is different in network security. Threats change, new problems emerge, and your network has to evolve.
Stay ahead of the curve. See the top eight types of network attacks recorded in Q2 2017. You’ll get a review of the data and descriptions for each type.
Continue readingFileless Malware: How it Steals in Plain Sight
Some malware can hide in plain sight – injecting itself into RAM and active processes. This makes it almost impossible to detect with traditional antivirus.
Get an overview of “fileless malware”, how it works, and how it can takeover. You’ll also see examples of recent fileless attacks against restaurants, website visitors, and more.
Continue reading