Calyptix, Author at Calyptix Security - Page 5 of 15 Calyptix, Author at Calyptix Security - Page 5 of 15
Post written by : Calyptix
Post written by : Calyptix

Business Email Compromise: How a Scam Email Steals $400,000

BEC attacks

Hackers have a new trick to steal money. It’s as simple as an email, and it can destroy a small business if successful.

Uncover the threat of “business email compromise” – a special type of email scam that the FBI says caused more damage last year than ransomware, phishing, or corporate data breaches.

Continue reading

Filed under : Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : top threats

Top 4 Insights from Verizon Data Breach Report 2017

verizon-dbir-2017-threat-actions

One of the best reports in the industry, the Verizon DBIR is jam packed with insights on network security and data breaches.

See the top three attacks that cause data breaches. Also check out the one thing used by 80% of successful hackers, and find out what attackers want most.

Continue reading

Filed under : Malware , Research , Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : malware , research , top threats

10 Biggest Problems in Healthcare Cybersecurity

healthcare cybersecurity

A perfect storm is raining down on healthcare cybersecurity. The industry is vast and complex, has tremendous amounts of patient data, and is not equipped to protect it. The result is a bonanza for cybercrime. From the WannaCry ransomware attacks in the U.K., to the ongoing healthcare data breaches across the U.S.

Read on to learn about the major healthcare cybersecurity threats facing the industry and how you can address them

Continue reading

Filed under : hipaa , Top threats
Author : Calyptix
Comment Number : 1 Comment
Tagged on : HIPAA , top threats

Application Whitelisting: What it is and why it’s good

Application whitelisting 1

Application whitelisting can be a great way to enhance network security and lock-out malware. But what are the drawbacks of application whitelisting? Is it the right choice for every environment?

Find the answers to these questions and more in this post. You’ll also see lists of free and paid application white listing tools, and resources you can use to learn more about this tool

Continue reading

Filed under : Top threats
Author : Calyptix
Comment Number : 2 Comments
Tagged on : top threats
Page 5 From 15