Calyptix Blog

Hospital Ransomware Attacks: A HIPAA Breach?

by Calyptix, June 14, 2017

hospital ransomware attacks

Healthcare systems in the U.S. continue to face powerful ransomware attacks. Some are still reeling from the WannaCry attack that began in May.

This outbreak has left some IT pros wondering: Why is ransomware targeting hospitals? Is infection a HIPAA breach? Find out in this post.

Continue reading

Filled under : hipaa , Malware
Tagged on : HIPAA , malware , top threats

10 Biggest Problems in Healthcare Cybersecurity

by Calyptix, June 13, 2017

healthcare cybersecurity

A perfect storm is raining down on healthcare cybersecurity. The industry is vast and complex, has tremendous amounts of patient data, and is not equipped to protect it. The result is a bonanza for cybercrime. From the WannaCry ransomware attacks in the U.K., to the ongoing healthcare data breaches across the U.S.

Read on to learn about the major healthcare cybersecurity threats facing the industry and how you can address them

Continue reading

Filled under : hipaa , Top threats
Tagged on : HIPAA , top threats

WannaCry Ransomware? The Answer is “Yes”

by Calyptix, May 17, 2017

WannaCry Ransomware

A new and dangerous strain of ransomware known as WannaCry exploded onto the web last week, seizing an estimated 300,000 computer systems in just a few days.

Read on to find out how you can protect yourself and your clients from this infectious malware.

Continue reading

Filled under : Malware , Top threats
Tagged on : malware , ransomware , top threats

Application Whitelisting: What it is and why it’s good

by Calyptix, April 17, 2017

Application whitelisting 1

Application whitelisting can be a great way to enhance network security and lock-out malware. But what are the drawbacks of application whitelisting? Is it the right choice for every environment?

Find the answers to these questions and more in this post. You’ll also see lists of free and paid application white listing tools, and resources you can use to learn more about this tool

Continue reading

Filled under : Top threats
Response: 1 Comment
Tagged on : top threats

New UTM Firewall Announced by Calyptix Security

by Calyptix, April 12, 2017

Huge improvement in RAM and processing power for new AE1400 Charlotte, NC – Calyptix Security has unveiled the latest addition to its signature AccessEnforcer product line: the AE1400. The new unified threat management firewall boasts faster processor speeds as well as improved device efficiency. The latest AccessEnforcer model is equipped with … Continue reading

Filled under : Press Releases , Uncategorized
Tagged on : Press Release

Healthcare Data Breaches Expected to Dominate 2017

by Calyptix, January 16, 2017


Cyberattacks have pummeled the healthcare industry for years. Some of the biggest data breaches in history have struck there. And nothing is likely change soon.

See why healthcare is expected to top the list of cyber-targets for hackers and data thieves in 2017. You’ll also see why small data breaches are becoming a huge problem.

Continue reading

Filled under : hipaa
Tagged on : HIPAA

DNC Hacks: How Spear Phishing Emails Were Used

by Calyptix, December 30, 2016

Network Security Threats 1

Cyberattacks big and small often start with the same thing: phishing emails. That’s how the breach started at the DNC, and that’s how one is likely to start at your small business.

See how spear phishing emails breached a major U.S. political party, and see how the party’s mistakes can help improve network security at your company. You’ll also see the FBI’s latest report describing the hacks.

Continue reading

Filled under : Research , Top threats

Top Network Security Threats for Retailers this Holiday Season

by Calyptix, December 19, 2016

Network Security Threats 1

The weeks around Christmas are always demanding for retailers. When caught up in the madness of the season, they may get lax on network security.

Doing so however can land a business in the midst of a breach scandal, resulting in fines and bad reputations. See what could be threatening your retail clients and how you can help.

Continue reading

Filled under : pci dss , Top threats
Tagged on : PCI DSS , top threats
Page 2 From 12