Our Blog

Stay up to date with the latest articles in Network Security
June 16, 2016

PCI DSS 3.2 – New Changes for IT Service Providers

pci-dss-32

A new version of PCI DSS is now available. With it comes major changes for service providers and merchants in how to protect cardholder data.

Are you a “service provider” as defined by PCI DSS? Do the changes affect you or your IT clients? Find out in this post.

Continue reading
Continue Reading
June 13, 2016

Top 7 Network Attack Types in 2016

computer-security-incident-oops

Is your company prepared to take on the network attacks targeting small businesses this year? Need to brush up on what threats to prepare for?

Read on to learn more about the top network attack trends that could be targeting your business in 2016.

Continue reading
Continue Reading
June 1, 2016

The Ransomware Plague in Hospitals and Healthcare

computer-security-incident-oops

A ransomware plague has struck hospitals and other healthcare organizations across the U.S. Victims are paying ransoms of nearly $20,000 to unlock millions of files.

How does this happen? Why is healthcare a target? What can you do to protect yourself? Read on to find out.

Continue reading
Continue Reading
May 30, 2016

Phishing Attacks: 30% will open a scam email

computer-security-incident-oops

Verizon released its 2016 Data Breach Investigations Report, and along with it some astonishing facts about the prevalence and success of phishing attacks.

See why you shouldn’t be deceived by the simple nature of phishing emails and how they can worm their way into your company’s data.

Continue reading
Continue Reading
May 20, 2016

Shelter from Cyber Regulation: NIST 800-171

Shelter from Cyber Regulation: NIST 800-171

We are seeing more and more laws and regulations that outline the do’s and don’ts of cybersecurity. One in particular is the NIST 800-171 rule.

See how this particular new regulation can affect your cybersecurity business - big or small.

Continue reading
Continue Reading
April 13, 2016

Top 5 Sources of Security Incidents in Retail

computer-security-incident-oops

Russian cyber gangs, Chinese state actors, the hacker group Anonymous – who is the main source of security incidents? The answer might surprise you.

See the top five actors behind security incidents in the retail and consumer industries. You’ll get stats and analysis with a description of each source.

Continue reading
Continue Reading
April 8, 2016

Mobile Malware: 4 Biggest Myths and How to Stay Safe

Everything-is-fine-office-cloud-fire

Mobile phones are everywhere, and they hold a growing amount of our lives and work. But are they safe for the office? Is mobile malware a real threat?

See the top four myths about mobile malware and what they mean for your security. Find out how fast the problem is growing and how to keep your phone safe.

Continue reading
Continue Reading
March 17, 2016

Top 5 Cloud Computing Risks

Everything-is-fine-office-cloud-fire

There is no denying it: cloud services are popular. But even if you feel that they are the best fit for your company, you should know that they do not come without risk.

See the top five risks of cloud computing, and see how sending your tasks to the sky might impact your data security, availability, and compliance.

Continue reading
Continue Reading
February 8, 2016

HIPAA Compliance Ignored by Healthcare Lawyers

healthcare-lawyers-ignore-hipaa

Healthcare networks took a beating last year. As they tighten security, attackers will look for new ways to steal health data – and lawyers may be the next target.

See research showing that many law firms who should comply with HIPAA don't. You will also see how you can use this trend to help protect your clients and win new ones.

Continue reading
Continue Reading
January 20, 2016

2016 Predictions for Small Business Cyber Security (Part 2 of 2)

small-business-cyber-security-predictions

Wait, there's more! Check out the second half of our predictions for cyber security trends in 2016.

See what we expect will happen in healthcare, regulation, DDoS attacks, and more.

Continue reading
Continue Reading
1 9 10 11 12 13 17

About Us

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology. Our customers do not waste time with security products designed for large enterprises. Instead, we make it easy for SMBs to protect and manage networks of up to 350 users.
GET STARTED
MSPRESELLER
home
contact
call us
call
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram