Blog - Calyptix Security Blog - Calyptix Security

HIPAA Security: Most business associates suffer data breaches

by Calyptix, May 18, 2015


You’ve heard about the massive data breaches at hospitals and health insurers – but what about their business associates? Are IT providers seeing similar attacks? And are the attacks successful?

In short: yes. Find out more about the growing number of attacks on healthcare business associates. See the top causes of data breaches and the most-targeted types of data.

Continue reading

Filed under : hipaa , Research
Tagged on : healthcare , HIPAA

Cyber Insurance: Is it right for your company?

by Calyptix, May 5, 2015

Cyber Insurance

The average cost of a cyber attack on a small business is more than $20,000 – and that’s just the average. Since the number of breaches shows no sign of slowing, it might be the right time to consider a cyber insurance policy for your business.

Find out if cyber insurance is right for your company in this post. We’ll show you what a cyber policy typically covers, and you’ll get tips for finding the right policy in the market.

Continue reading

Filed under : Top threats
Tagged on : top threats

Free Firewall Promotion Launched by Calyptix and ASCII Group

by Calyptix, April 29, 2015

Includes a free AccessEnforcer UTM firewall device and a free month of unlimited service for ASCII members Charlotte, NC – Calyptix Security, a leading provider of network security and management solutions for small and medium business, today announced a free firewall promotion for members of the ASCII Group, the nation’s … Continue reading

Filed under : Press Releases

DDoS Attacks 101: Types, targets, and motivations

by Calyptix, April 26, 2015

DDoS Attacks

Denial-of-service attacks continue to grow in frequency and size. But are all DDoS attacks the same? And what motivates people to launch one of these attacks?

Find answers to these questions and more in this post. You’ll also see the most common types of tools and targets for application-layer attacks.

Continue reading

Filed under : Research , Top threats
Tagged on : ddos

Verizon Data Breach Report 2015: Top 10 Charts and Summary

by Calyptix, April 17, 2015

DBIR chart significant threat actions over time by percent

See which threats are growing fastest, which industries are targeted the most, and how one in four data breaches last year hit a POS system.

You’ll get this and more in our summary of the Verizon 2015 Data Breach Investigations Report. The report is a whopper at 60+ pages. We highlight our 10 favorite charts to get you up to date and save you time.

Continue reading

Filed under : Research
Tagged on : research

Health IT Spending: Security is top focus for 2015

by Calyptix, April 13, 2015

health IT security spending 2015 chart thumbnail

Health IT departments are looking to make big investments in 2015. If you know their plans and concerns, you can beat the competition and offer the services your clients want most.

Find out how health IT departments are planning to spend their technology budgets this year. You’ll see why security is a major priority, and how mobile technology is predicted to continue expanding.

Continue reading

Filed under : hipaa , Regulations
Tagged on : HIPAA

How to Break into the Dental IT and Integration Market

by Calyptix, April 7, 2015

Dental IT

Focusing your marketing and sales efforts on a niche can be a great way to accelerate growth at your IT business. Once you land your first client, your second, third, and fourth can be just a referral away.

One Calyptix partner has had great success selling in the market for dental IT and integration. Read on to see his tips and secrets for breaking in.

Continue reading

Filed under : How to
Response: 3 Comments
Tagged on : HIPAA

Security Trends 2015: Mandiant threat report highlights

by Calyptix, March 18, 2015


Did you know more than 75% of phishing emails seen by Mandiant last year impersonated the IT staff or an antivirus solution? Scarey, right?

Learn more about this threat and others highlighted in Mandiant's latest report. You'll also see which industries are attacked most (not the ones you think) and why VPN is a growing target for attackers.

Continue reading

Filed under : Research , Top threats
Tagged on : research
Page 18 From 23