Calyptix Blog

Smaller HIPAA Breaches Under Scrutiny

by Calyptix, October 10, 2016

OCR Enforces Data Breaches

In August 2016, the Office of Civil Rights (OCR) notified Covered Entities and Business Associates that it is widening its efforts to identify protected health information (PHI) breaches that affect less than 500 individuals.

While expensive news for businesses, it is a ripe opportunity for IT providers to deliver valuable cybersecurity services to new and existing clients. Read on to see how your company could benefit.

Continue reading

Filled under : hipaa
Tagged on : HIPAA

Types of Firewalls: The Good, the Minimal, and the Effective.

by Calyptix, September 26, 2016

types of firewalls 1

Firewalls are great tools to use for network protection, especially if your business is regulated by laws such as HIPAA and PCI DSS.

But which types of firewalls are the most beneficial for your clients' business?

Continue reading

Filled under : Top threats
Tagged on : top threats

Discover the top 3 causes of HIPAA violations and their simple solutions

by Calyptix, September 12, 2016

Network Security Concerns 5

HIPAA violations could cost your healthcare client quite a bit of money. Up to $1.5 million to be exact.

Read on to see what the top breaches are and how you can prevent them from occurring.

Continue reading

Filled under : hipaa
Tagged on : HIPAA

Top Network Security Concerns of Your Clients

by Calyptix, August 29, 2016

Network Security Concerns 5

Knowing the network security concerns that creep into your client’s minds is a great way to build their trust and speak to issues they care about. But what are those concerns?

See the top network security worries for businesses across seven industries. We cover retail, healthcare, financial services, tech, and more.

Continue reading

Filled under : Top threats
Tagged on : top threats

Multi-factor authentication: What it is and why small businesses should care

by Calyptix, August 22, 2016

Passwords are not as safe as they used to be. Multi-factor authentication is becoming more common to beef up security. But should you use it on your systems?

Read on to learn more about multi-factor authentication, including the three types of data that can verify an identity and which one is hacked the most.

Continue reading

Filled under : Top threats
Tagged on : top threats

Top 5 Cyber Attack Types in 2016 So Far

by Calyptix, August 1, 2016

In the ever-evolving field of network security, one can’t afford to be out of the loop when it comes to the most popular cyber attacks.

See what you’re up against with this new chart of the most popular attack types in Q2 2016.

Continue reading

Filled under : Top threats
Tagged on : top threats

Infographic: Phishing Email Attack Flow

by Calyptix, July 25, 2016

Email phishing may seem like an easy attack to dodge, but with more sophisticated attacks coming down the pipeline, it can be hard to tell which emails are malicious and which ones aren’t.

Need help teaching or reminding your employees on the dangers of email phishing? Check out our Email Phishing Infographic, which shows the many ways users can be tricked.

Continue reading

Filled under : Top threats

5 Easy Ways Small IT Departments can Train Employees on Network Security

by Calyptix, July 18, 2016

healthcare-data-breach-cost-expensive

Teaching employees network security best practices and threat warning signs can be one tough job, especially if you are a smaller IT team.

Get the ball rolling with these five easy tips on how to begin employee security training at your company.

Continue reading

Filled under : Top threats
Page 3 From 12