A new DHS report is out on cyber security in healthcare. Although it paints a grim picture of the industry’s struggle, it’s also loaded with technical tips you can use to protect your IT clients.
See the report’s top five threats to data security in healthcare, and get an in-depth look at the 10 recommended security practices to combat them.
Continue Reading →On a tight budget and want rock solid security? Check out the top 10 cyber security tools for small businesses.
We run through the top 10 – from firewalls to encryption – and provide descriptions and links to free options.
Continue readingDid you know that some security products can make you less safe online? Researchers found one feature – HTTPS traffic inspection – almost always harms the security of people who use it.
Find out how SSL filters harm the security of millions of people every day, and also see how the HTTPS web filter in AccessEnforcer is different.
Continue readingIn network security, you have to prioritize. You could take hundreds of steps to improve your security, but which ones really matter?
See just five security controls you can use to stop about 85% of all cyber attacks – basically, most of the common attacks seen today. The controls come from the CIS 20 (formerly known as the SANS 20).
Continue readingYou need to know the devices that are allowed to use your network. The good news is you do not need a complicated or expensive asset management system to do it.
See a fast and easy way to document the devices on your network. You can get organized and start saving time.
Continue readingA data breach can wipe out a company – but it doesn’t have to. You can limit the damage and lower the cost, big time.
See the top 10 ways to lower the cost of a data breach, according to research from Ponemon Institute. How many of them do you have?
Continue readingPasswords are often the only barrier between your data and malicious actors. But many users continue to use weak passwords like “123456”, putting their data and companies at risk.
See how attackers will try to steal your password, and see how to stop them, in this post on strong password security.
Continue readingTeaching employees network security best practices and threat warning signs can be one tough job, especially if you are a smaller IT team.
Get the ball rolling with these five easy tips on how to begin employee security training at your company.
Continue readingBusiness travelers tend to check email and update spreadsheets on the road – sometimes from the comfort of an economy seat on an airplane. But did you know this can raise the risk of a data breach at your company?
Stay safe with these seven tips for data security on business trips. Share them with your clients to show them that you’re an expert.
Continue readingThe web is flooded with malware. Most users don’t have a clue on how to avoid it. What if you could give your clients three simple ways to stay safe? Would you save time and money?
See three easy-to-follow rules that will dramatically reduce the chances of a malware infection. They come from Spam Nation, the best-selling book by cyber security journalist Brian Krebs.
Continue reading