Our Blog

Stay up to date with the latest articles in Network Security
July 2, 2018

Most HIPAA Data Breaches Happen via Email


Email is an old channel, but it remains one of the most popular for cyber attacks. This is true in many industries, and especially in healthcare.

See why email remains the top location of HIPAA data breaches, and see other types of breaches that – while fewer in number – cause far more harm.

Continue reading
Continue Reading
June 25, 2018

Top 10 Security Vulnerabilities of 2017


New vulnerabilities are discovered every week – some silly and some severe. Knowing which are the most dangerous depends on several factors, including the popularity of the flaw among data thieves.

See the top 10 vulnerabilities in exploit kits in 2017. We list and describe each security flaw and also explain why Adobe products no longer dominate the top 10.

Continue reading
Continue Reading
June 11, 2018

Top 5 Cyber Security Frameworks in Healthcare


HIPAA compliance is not enough to protect patient data. For that, you need a more comprehensive plan. You need a security framework.

See the top five cyber security frameworks in healthcare. Is your framework on the list?

Continue reading
Continue Reading
June 11, 2018

VPNFilter: 500,000 Infected and Worse Than Reported


A nasty strain of malware has infected hundreds of thousands of routers – and it’s worse than initially thought.

Called VPNFilter, the malware allows attackers to monitor traffic, steal login credentials, brick the device, and even inject malicious JavaScript into users’ web sessions.

See who is vulnerable to VPNFilter, how it works, and who might be responsible for launching it.

Continue reading
Continue Reading
April 16, 2018

Errors Found in the Verizon Data Breach Report 2018

The Verizon DBIR is one of the most respected cyber security reports published each year – but can you trust the data?

See errors we found in the new 2018 edition of the DBIR. Decide for yourself if the report is trustworthy.

Continue reading
Continue Reading
April 13, 2018

Top Causes of Data Breaches by Industry 2018: Verizon DBIR


Most IT firms have clients from a range of industries. That means you encounter a wide range of security threats. How do you know which threats are the most important to focus on?

Check out the leading causes of data breaches across eight sectors. You’ll see attack trends in retail, healthcare, finance, government, and more – and even a few surprises.

Continue reading
Continue Reading
March 26, 2018

Top 5 Causes of Data Breaches in Healthcare

Top 5 Causes of Data Breaches in Healthcare

Do you have the right priorities in healthcare cyber security?

You might be surprised to learn that data breaches in healthcare are often different than in other industries. They’re more often caused by insiders, not by malware.

Check out the highlights of a new report from Verizon on the top causes of data breaches in healthcare. You’ll see the top causes reported from 2015 to 2017.

Continue reading
Continue Reading
February 12, 2018

HIPAA Breach Statistics: Stolen Record Count Plunges

HIPAA Breach Stats

If you saw only the headlines, you might think healthcare had a terrible year in cyber security – maybe worse than ever. But a new report shows, in many ways, the industry gained ground last year.

See highlights of the newest stats on data breaches in healthcare. See where more work is needed and get a few talking points to share with your clients.

Continue reading
Continue Reading
January 26, 2018

Spectre and Meltdown: Nothing is Certain


Two massive chip vulnerabilities are here and the security industry is scrambling for answers. Misinformation is everywhere, and even the patches are wreaking havoc.

Find the answers to your questions on Spectre and Meltdown in this post. You’ll see the problem, the solution, and know which rumors are fake news.

Continue reading
Continue Reading
1 4 5 6 7 8 17

About Us

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology. Our customers do not waste time with security products designed for large enterprises. Instead, we make it easy for SMBs to protect and manage networks of up to 350 users.
call us
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram