Calyptix Security Releases AccessEnforcer 5.0 Beta to Add Network Authentication for Microsoft RDP and SSH Access
Charlotte, NC – Calyptix Security Corporation, maker of the AccessEnforcer® UTM Firewall, today announced the release of AccessEnforcer 5.0 Beta at CompTIA ChannelCon Online which adds GatekeeperTM and Geo Fence, … Continue reading
We are always excited to announce AccessEnforcer releases, but today we are especially excited to announce the release of AccessEnforcer v5.0! In this milestone release we are introducing two great … Continue reading
Risk assessments are a HIPAA requirement. Yet, seven of the nine HIPAA penalties announced this year (78%) were levied on organizations that failed to conduct one.
In this post, we explore two cases where risk assessments were not conducted, and also highlight a free resource to help smaller organizations get the job done.Continue Reading →
Ransomware attacks have changed. They’re more targeted, more dangerous, and causing more financial damage to victims than ever, according to the FBI.
See the industries hit hardest by the new rash of ransomware attacks – including examples of companies that ransomware killed. You’ll see the tactics being used and how to fight them.Continue Reading →
More cyber attacks that target managed service providers (MSPs) and other IT services have surfaced, according to new research from Symantec.
See more about the attack and how it fits into a growing number of attacks against the IT industry and its clients.Continue Reading →
Federal agencies -- including the NSA and CISA -- are alerting the public to a major security vulnerability in older versions of Microsoft Windows (pre Windows 8). Researchers fear the flaw, dubbed BlueKeep, may be used for a widespread cyber attack like the WannaCry ransomware event in 2017.
Inside, find out if you're vulnerable to BlueKeep, how to patch it, and see workarounds if you're stuck with old versions of Windows.Continue Reading →
All five of the largest data breaches reported this year by HIPAA Business Associates share one thing: they centered on email.
In some cases, the compromise of a single email account exposed the personal information of tens-of-thousands of people. See all five breaches and more inside.Continue Reading →