Post filled under : Top threats
Post filled under : Top threats

Top 4 Insights from Verizon Data Breach Report 2017

verizon-dbir-2017-threat-actions

One of the best reports in the industry, the Verizon DBIR is jam packed with insights on network security and data breaches.

See the top three attacks that cause data breaches. Also check out the one thing used by 80% of successful hackers, and find out what attackers want most.

Continue reading

Filled under : Malware , Research , Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : malware , research , top threats

10 Biggest Problems in Healthcare Cybersecurity

healthcare cybersecurity

A perfect storm is raining down on healthcare cybersecurity. The industry is vast and complex, has tremendous amounts of patient data, and is not equipped to protect it. The result is a bonanza for cybercrime. From the WannaCry ransomware attacks in the U.K., to the ongoing healthcare data breaches across the U.S.

Read on to learn about the major healthcare cybersecurity threats facing the industry and how you can address them

Continue reading

Filled under : hipaa , Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : HIPAA , top threats

Application Whitelisting: What it is and why it’s good

Application whitelisting 1

Application whitelisting can be a great way to enhance network security and lock-out malware. But what are the drawbacks of application whitelisting? Is it the right choice for every environment?

Find the answers to these questions and more in this post. You’ll also see lists of free and paid application white listing tools, and resources you can use to learn more about this tool

Continue reading

Filled under : Top threats
Author : Calyptix
Comment Number : 1 Comment
Tagged on : top threats

DNC Hacks: How Spear Phishing Emails Were Used

Network Security Threats 1

Cyberattacks big and small often start with the same thing: phishing emails. That’s how the breach started at the DNC, and that’s how one is likely to start at your small business.

See how spear phishing emails breached a major U.S. political party, and see how the party’s mistakes can help improve network security at your company. You’ll also see the FBI’s latest report describing the hacks.

Continue reading

Filled under : Research , Top threats
Author : Calyptix
Comment Number : No Comment Yet

Top Network Security Threats for Retailers this Holiday Season

Network Security Threats 1

The weeks around Christmas are always demanding for retailers. When caught up in the madness of the season, they may get lax on network security.

Doing so however can land a business in the midst of a breach scandal, resulting in fines and bad reputations. See what could be threatening your retail clients and how you can help.

Continue reading

Filled under : pci dss , Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : PCI DSS , top threats

3 Dangerous Misconceptions about EMV Chip Cards and Readers

Strong Password Security 1

As more merchants begin to accept EMV chip cards, some may be feeling a false sense of security. Are the chip cards enough to protect them from PCI DSS fines?

No, they’re not. While they’re more secure than magnetic stripe cards, EMV cards are not a silver bullet to your client’s data security needs. See why in this post.

Continue reading

Filled under : pci dss , Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : PCI DSS , top threats

Password Security: How to thwart hackers with a strong password

Strong Password Security 1

Passwords are often the only barrier between your data and malicious actors. But many users continue to use weak passwords like “123456”, putting their data and companies at risk.

See how attackers will try to steal your password, and see how to stop them, in this post on strong password security.

Continue reading

Filled under : Malware , Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : malware , top threats

3 Common DNS Attacks and How to Fight Them

DNS attack

DNS attacks can shake the foundation of your network and even disrupt huge chunks of the internet. Just last month, a single day of attacks blocked access to sites like Netflix and Twitter for thousands of people.

How can DNS attacks harm your network? Find out in this post, and see three common types of DNS attacks and how to prevent them.

Continue reading

Filled under : Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : top threats
Page 1 From 4