Wire fraud is the modern-day bank heist. Instead of masks and guns, thieves use stolen email credentials and clever deception to snatch thousands of dollars. How do these heists begin? With stolen data.
Get a quick overview of wire fraud tactics so you can protect your business and your clients. See how thieves steal the data, fool the banks, and make off with the money.
Continue readingA data breach can bring a long list of expenses, and among them is often “damage to reputation.” But do your healthcare clients believe this? Will their reputations be harmed after a breach?
Yes -- HIPAA almost guarantees it.
See how HIPAA forces organizations to spend time and money marketing against themselves after a breach. Show your clients to convince them the threat to their business is real.
Continue readingRomance scams, business email fraud, and scams targeting the elderly, were all popular last year, according to the annual report of the FBI Internet Crime Compliant Center.
In this post, we highlight four trends shown in the FBI’s data. You’ll see that social media scams increased 400%, and who is most at risk for romance scams and business email compromises.
Continue readingEverything was great. You were in compliance with PCI DSS. You were the belle of the ball. Everyone was in awe of your team. Then it was midnight -- and your compliance vanished.
Or did it? When the clock strikes 12:00 on June 30, PCI will have five new rules as its ‘best practice guidelines’ become requirements. Will you still be in compliance?
In this post, you’ll see the five new rules so you can have them covered.
Continue readingChances are you can name four or five types of network attacks – but which are the most common? And which are you most likely to see on one of your networks?
In this post, we show the top 7 types of network attacks worldwide during the first quarter of 2015. You’ll see the list and description for each type.
Continue readingHIPAA is huge. Out of its hundreds of pages, only a small portion apply to IT. How do you find the rules that matter?
The most important section of HIPAA for IT is the Security Rule. Even within this portion there is a ton of irrelevant information. In this post, we cut through the clutter and show you the parts of HIPAA that affect IT most.
Continue readingDid you think you crossed the PCI DSS finish line? Unfortunately , the rules have changed. Only a few months after the Jan. 1 deadline to comply with PCI DSS 3.0, the PCI Council released a new version and said it was effective immediately.
In this post, see the changes in the new PCI DSS 3.1. You’ll see the requirements most affected by the update and why you may need a “risk mitigation and migration” plan to stay compliant.
Continue readingYou’ve heard about the massive data breaches at hospitals and health insurers – but what about their business associates? Are IT providers seeing similar attacks? And are the attacks successful?
In short: yes. Find out more about the growing number of attacks on healthcare business associates. See the top causes of data breaches and the most-targeted types of data.
Continue readingThe average cost of a cyber attack on a small business is more than $20,000 – and that’s just the average. Since the number of breaches shows no sign of slowing, it might be the right time to consider a cyber insurance policy for your business.
Find out if cyber insurance is right for your company in this post. We’ll show you what a cyber policy typically covers, and you’ll get tips for finding the right policy in the market.
Continue readingDenial-of-service attacks continue to grow in frequency and size. But are all DDoS attacks the same? And what motivates people to launch one of these attacks?
Find answers to these questions and more in this post. You’ll also see the most common types of tools and targets for application-layer attacks.
Continue reading