Our Blog

Stay up to date with the latest articles in Network Security
January 11, 2016

2016 Predictions for Small Business Cyber Security (Part 1 of 2)


2016 is here and we have a full year of cyber security news and trends ahead of us.

But what happened last year? And what does it mean for 2016? Read on to find out.

Continue reading
Continue Reading
December 22, 2015

Top 3 Causes of Health Data Breaches


Healthcare is the most-breached business sector, both in the number of breaches and in the number of records compromised, according to research from Gemalto.

But what are the main causes of data breaches in healthcare? What can you do to prevent them and protect your clients? We dig into Verizon’s 2015 Protected Health Information Data Breach Report to tell you.

Continue reading
Continue Reading
December 3, 2015

HIPAA Compliance for IT: The regulations you need


HIPAA is huge and confusing. The regulations are so massive that few people can point to a document and say “this is HIPAA.”

But if you’re an IT service provider, we have narrowed down the parts of HIPAA that matter to you. You can see them in this document. The text in this PDF comes straight from the Code of Federal Regulations, the only official source of the HIPAA guidelines.

Continue reading
Continue Reading
October 16, 2015

Egress Filtering 101: What it is and how to do it


Egress filtering is a powerful tool that can disrupt many attacks. It does this by controlling outbound connections from the network and blocking any that are disallowed.

But egress filtering is easy to misconfigure. In this post, you will get a quick review of egress filtering, including tips on where, why, and how to deploy it.

Continue reading
Continue Reading
October 13, 2015

Healthcare IT: 4 tips to get more small business clients in healthcare


Healthcare IT is a fantastic market to break into. Potential clients are high in number and your IT services are in high demand due to regulations like HIPAA and constant news stories about data breaches.

How can you make it easier to sell IT services in healthcare? We interviewed a Calyptix reseller partner who has been rapidly growing in the healthcare industry. Get four simple tips in this article.

Continue reading
Continue Reading
October 8, 2015

Deadline for EMV chip cards is here – SMBs aren’t ready

Deadline for EMV chip cards

The deadline for merchants to accept EMV “chip cards” is here. Anyone who accepts credit card payments now has to use the new chip-card method or risk having to repay the money lost in fraudulent transactions.

Are your clients at risk? Check this post to get up to speed on the EMV card deadline, what it means for your clients, and how this can be a big sales opportunity for your business.

Continue reading
Continue Reading
September 22, 2015

Small Business Cyber Attacks that Stole Thousands

Small Business Cyber Attacks that Stole Thousands

Need a few examples of small businesses hit by cyber attacks? This article has three examples to show how a simple phishing email or malware infection can bring huge losses.

Also: did you know that banks are not required to repay funds stolen from a business account? You’ll see why in this article. Show your clients to make sure they realize: once a hacker has their money, it’s gone.

Continue reading
Continue Reading
September 13, 2015

4 Reasons Why Healthcare Data Breaches Are Rising

Healthcare Data Breaches

The last two years have been filled with news reports about major data breaches. First, we heard about millions of records compromised at retailers like Target and Home Depot. Now major healthcare organizations are getting hit.

Why is this happening? In this post, see four top reasons why healthcare networks are a major target for data breaches, and why the criminals seem to be winning the war.

Continue reading
Continue Reading
August 17, 2015

3 Simple Rules to Stop Malware

Stop malware

The web is flooded with malware. Most users don’t have a clue on how to avoid it. What if you could give your clients three simple ways to stay safe? Would you save time and money?

See three easy-to-follow rules that will dramatically reduce the chances of a malware infection. They come from Spam Nation, the best-selling book by cyber security journalist Brian Krebs.

Continue reading
Continue Reading
August 14, 2015

Malvertising is growing fast – here’s how to avoid it


Criminals are placing ads on some of the most popular sites on the web. The scariest part: the ads can infect users with malware without even clicking.

Learn more about the rapidly growing threat called “malvertising.” Find out how attackers are combining zero-day exploits, malware, and online ads for a powerful attack strategy, and see how you can avoid it.

Continue reading
Continue Reading
July 29, 2015

Wire Fraud: How an email password can cost you $100,000

Wire Fraud

Wire fraud is the modern-day bank heist. Instead of masks and guns, thieves use stolen email credentials and clever deception to snatch thousands of dollars. How do these heists begin? With stolen data.

Get a quick overview of wire fraud tactics so you can protect your business and your clients. See how thieves steal the data, fool the banks, and make off with the money.

Continue reading
Continue Reading
1 10 11 12 13 14 17

About Us

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology. Our customers do not waste time with security products designed for large enterprises. Instead, we make it easy for SMBs to protect and manage networks of up to 350 users.
call us
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram