The HIPAA regulations have not changed recently, but their impact and application in healthcare change constantly.
Check out our predictions for HIPAA 2015. You’ll see why we think criminal attacks and enforcement will rise, and why everyone might give their business associate agreement a closer look.
Continue readingCryptoWall is the latest strain of ransomware to lock files and demand ransom payments to release them. But does paying the ransom work?
You'll find out inside. You'll also learn more about the threat and how to prevent it from hurting your organization.
Continue readingHIPAA has a long list of "requirements" for IT providers -- but did you know that some of the rules are not as concrete as they seem?
See which parts of HIPAA's security rule gives you some flexibility, and see just how far you can bend the rules before the cracks start to show in your compliance and security.
Continue readingThe Bash vulnerability known as Shellshock is not hitting SMB IT providers as hard as other companies, but it does raise questions about their vendors.
Are your technology vendors making the right choices for your security? How have they responded to this new threat? We explore these topics and more inside.
Continue readingPOS malware is breaking through defenses at retailers across the nation -- but why are POS systems so vulnerable? And how can you stop this threat?
See 5 reasons why POS malware is winning the battle and 18 ways you can boost POS security to block it.
Continue readingBasic wireless router security is terrible and it may be getting worse. We review the results of a hacker contest that found 15 zero-day vulnerabilities in popular SOHO routers.
See which router models are affected, and find out why most of these vulnerabilities have risen from the grave.
Continue readingPOS malware is attacking thousands of retailers across the U.S. Here we provide a quick overview of this massive threat.
See the three major types of POS malware, the most popular variants today, and what a typical POS attack looks like.
Continue readingFind out more about what the report calls a "compliance nightmare on the horizon" for healthcare IT security.
Continue reading