Blog - Calyptix Security Blog - Calyptix Security

HTTPS Web Filters Can Harm Your Security – Here’s How!

by Calyptix, August 17, 2018

HTTPS-Web-Filters-Can-Harm-Your-Security-1

Did you know that some security products can make you less safe online? Researchers found one feature – HTTPS traffic inspection – almost always harms the security of people who use it.

Find out how SSL filters harm the security of millions of people every day, and also see how the HTTPS web filter in AccessEnforcer is different.

Continue reading

Filed under : Top threats
Tagged on : top threats

DDoS Attacks 2018: New Records and Trends

by Calyptix, August 10, 2018

DDoS-Attacks-2018---1

Small businesses take note: denial-of-service attacks continue to grow in strength and hundreds of thousands are launched each month.

See the latest trends in DDoS attacks – including two record-breakers this year that shocked security researchers.

Continue reading

Filed under : Top threats
Tagged on : top threats

Cyber Mistakes in Healthcare: Vulnerabilities and Misconfigs.

by Calyptix, August 6, 2018

Cyber-Mistakes-in-Healthcare-1-1

Everyone knows who to blame for a data breach – the bad guys. But what happens when one of the good guys makes a mistake? Unfortunately, the impact can be just as severe.

Check out two major threats to cyber security in healthcare: software flaws and misconfigurations. See how a coding flaw from a vendor of a fat-finger from your coworker can lead to your next HIPAA breach.

Continue reading

Filed under : hipaa
Tagged on : HIPAA

Most HIPAA Data Breaches Happen via Email

by Calyptix, July 2, 2018

Most-HIPAA-Data-Breaches-Happen-via-Email-1

Email is an old channel, but it remains one of the most popular for cyber attacks. This is true in many industries, and especially in healthcare.

See why email remains the top location of HIPAA data breaches, and see other types of breaches that – while fewer in number – cause far more harm.

Continue reading

Filed under : hipaa
Tagged on : HIPAA

Top 10 Security Vulnerabilities of 2017

by Calyptix, June 25, 2018

top-10-vulnerabilities-of-2017---1

New vulnerabilities are discovered every week – some silly and some severe. Knowing which are the most dangerous depends on several factors, including the popularity of the flaw among data thieves.

See the top 10 vulnerabilities in exploit kits in 2017. We list and describe each security flaw and also explain why Adobe products no longer dominate the top 10.

Continue reading

Filed under : Top threats
Tagged on : top threats

Top 5 Cyber Security Frameworks in Healthcare

by Calyptix, June 11, 2018

Top-5-Cyber-Security-Frameworks-in-Healthcare-1

HIPAA compliance is not enough to protect patient data. For that, you need a more comprehensive plan. You need a security framework.

See the top five cyber security frameworks in healthcare. Is your framework on the list?

Continue reading

Filed under : hipaa
Tagged on : HIPAA

VPNFilter: 500,000 Infected and Worse Than Reported

by Calyptix, June 11, 2018

VPNFilter-router-attack-1

A nasty strain of malware has infected hundreds of thousands of routers – and it’s worse than initially thought.

Called VPNFilter, the malware allows attackers to monitor traffic, steal login credentials, brick the device, and even inject malicious JavaScript into users’ web sessions.

See who is vulnerable to VPNFilter, how it works, and who might be responsible for launching it.

Continue reading

Filed under : Top threats
Tagged on : top threats

Errors Found in the Verizon Data Breach Report 2018

by Calyptix, April 16, 2018

The Verizon DBIR is one of the most respected cyber security reports published each year – but can you trust the data?

See errors we found in the new 2018 edition of the DBIR. Decide for yourself if the report is trustworthy.

Continue reading

Filed under : Research , Top threats
Tagged on : research
Page 1 From 15