Calyptix Blog

3 Dangerous Misconceptions about EMV Chip Cards and Readers

by Calyptix, December 12, 2016

Strong Password Security 1

As more merchants begin to accept EMV chip cards, some may be feeling a false sense of security. Are the chip cards enough to protect them from PCI DSS fines?

No, they’re not. While they’re more secure than magnetic stripe cards, EMV cards are not a silver bullet to your client’s data security needs. See why in this post.

Continue reading

Filled under : pci dss , Top threats
Tagged on : PCI DSS , top threats

Password Security: How to thwart hackers with a strong password

by Calyptix, November 28, 2016

Strong Password Security 1

Passwords are often the only barrier between your data and malicious actors. But many users continue to use weak passwords like “123456”, putting their data and companies at risk.

See how attackers will try to steal your password, and see how to stop them, in this post on strong password security.

Continue reading

Filled under : Malware , Top threats
Tagged on : malware , top threats

New Types of Malware May Be Hiding in Your Network

by Calyptix, November 21, 2016

Types of Malware 1

Malware is no strange foe to network security. But a few new tactics are raising eyebrows, such as “blastware” that destroys the systems that flag it as a threat.

See examples of new types of malware threats and what you can do about them. You’ll get a list of tips to help keep your clients safe.

Continue reading

Filled under : Top threats
Tagged on : top threats

3 Common DNS Attacks and How to Fight Them

by Calyptix, November 14, 2016

DNS attack

DNS attacks can shake the foundation of your network and even disrupt huge chunks of the internet. Just last month, a single day of attacks blocked access to sites like Netflix and Twitter for thousands of people.

How can DNS attacks harm your network? Find out in this post, and see three common types of DNS attacks and how to prevent them.

Continue reading

Filled under : Top threats
Tagged on : top threats

HIPAA Violation Cases May Hit Record in 2016

by Calyptix, November 7, 2016


Why is the healthcare industry at such high risk for data breaches? Because they have a lot of loot, and the lock on the gate has been rusty for years

We dig into data on the latest health care data breaches to show you the trends for 2016. See why this year is on pace to match the industry record for number of breaches reported.

Continue reading

Filled under : hipaa

SSL VPN and IPsec VPN: How they work

by Calyptix, November 2, 2016


Virtual private networks are a great tool to use when building your business’s network security plan. So what options do you have?

The two most common VPN types are SSL VPN and IPsec VPN. Read on to see how they measure up to your company’s needs.

Continue reading

Filled under : Research

Types of Web Filters and How They Can Work for Your Clients

by Calyptix, October 17, 2016

Types of Web Filters 1

Web filtering is one of the most widely available network security tools. Out of the many varieties, do you know which will work best for your clients?

Read on to familiarize yourself with the most common types of web filters around.

Continue reading

Filled under : Top threats
Tagged on : top threats

Smaller HIPAA Breaches Under Scrutiny

by Calyptix, October 10, 2016

OCR Enforces Data Breaches

In August 2016, the Office of Civil Rights (OCR) notified Covered Entities and Business Associates that it is widening its efforts to identify protected health information (PHI) breaches that affect less than 500 individuals.

While expensive news for businesses, it is a ripe opportunity for IT providers to deliver valuable cybersecurity services to new and existing clients. Read on to see how your company could benefit.

Continue reading

Filled under : hipaa
Tagged on : HIPAA
Page 3 From 12