HIPAA has a long list of "requirements" for IT providers -- but did you know that some of the rules are not as concrete as they seem?
See which parts of HIPAA's security rule gives you some flexibility, and see just how far you can bend the rules before the cracks start to show in your compliance and security.
Continue readingThe Bash vulnerability known as Shellshock is not hitting SMB IT providers as hard as other companies, but it does raise questions about their vendors.
Are your technology vendors making the right choices for your security? How have they responded to this new threat? We explore these topics and more inside.
Continue readingPOS malware is breaking through defenses at retailers across the nation -- but why are POS systems so vulnerable? And how can you stop this threat?
See 5 reasons why POS malware is winning the battle and 18 ways you can boost POS security to block it.
Continue readingBasic wireless router security is terrible and it may be getting worse. We review the results of a hacker contest that found 15 zero-day vulnerabilities in popular SOHO routers.
See which router models are affected, and find out why most of these vulnerabilities have risen from the grave.
Continue readingPOS malware is attacking thousands of retailers across the U.S. Here we provide a quick overview of this massive threat.
See the three major types of POS malware, the most popular variants today, and what a typical POS attack looks like.
Continue readingFind out more about what the report calls a "compliance nightmare on the horizon" for healthcare IT security.
Continue readingAre basic wireless routers a cheap solution or a massive liability? Find out the six reasons why you never want to depend on a wireless router to protect your network.
Inside, you’ll see how some of the most popular routers being sold today can have massive security flaws, and how wireless router security flaws are caused.
Continue readingSmall office and home office routers (SOHO) can have so many security flaws that a hacker contest has been started to highlight the issue. The contest awards prizes to hackers who can discover new vulnerabilities in 10 popular routers.
What a great time to cover router security! In this post, you get 12 ways to improve the security of your wireless router, and you'll see why it might be best to leave the "routing" of network traffic to another device.
Continue readingIs Cryptolocker really dead? Some researchers have doubts -- even as new types of ransomware continue to attack computers across the globe.
In this post, you'll get an update on Cryptolocker and say "hi" to a new, potentially stronger brand of ransomware: Critroni.
Continue reading