-
[INFOGRAPHIC] Understanding the True Cost of a Data Breach for Financial Firms
The financial services industry has been hit hard this year with data breaches. Perhaps the most notorious was the Equifax breach that the nation is still reeling over. More than…
-
2108 Planning Considerations
The kids are settled back in school, holiday décor is already out in stores, and the new year is just around the corner. For most businesses, this signals strategic planning…
-
[INFOGRAPHIC] Understanding the True Cost of a Data Breach for Healthcare
Doesn’t it feel like every time you go online, there’s another data breach, another practice has been hacked or another cyberattack is holding patient data hostage? Many administrators think it…
-
6 Things to Look for in a Cybersecurity Partner
Cybersecurity is such an important part of today’s organization, impacting nearly every aspect of the company. So, it’s equally important to identify someone in the organization who can monitor cybersecurity…
-
The Importance of a Cybersecurity Training Plan
Your employees are your greatest vulnerability when it comes to protecting your sensitive data. You can put all the technical safeguards and protocols in place to protect the back-end of…
-
KRACK Attack: Protect Yourself from Severe Wi-Fi Vulnerability in All Devices
WPA2, the Wi-Fi protocol that protects most Wi-Fi-enabled devices, was recently compromised when a Belgian researcher uncovered a vulnerability in the protocol and published the details of the flaw. The…
-
[CHECKLIST] How to Protect Yourself from a Ransomware Attack
Due to the vulnerability of human nature, completely protecting your organization from a ransomware attack is difficult to manage on your own. But, by taking the following precautions, you’ll be…
-
In Case of Emergency: What to Do in a Ransomware Attack?
In a recent study of 4,000 small- and medium-sized companies, Kaspersky noted that 49% of SMB respondents reported ransomware as one of the most serious threats facing their organization. The…
-
What Is Spear Phishing and Why Is It So Dangerous?
You’ve ordered a dozen times from Amazon, but one day you receive an email asking you to confirm the details of your recent order. The problem is that you haven’t…
-
HIMSS 2017 Cybersecurity Survey Reveals Prevention Statistics
Our constant dialogue with our clients proves a common IT worry: cybersecurity prevention and protection is a top priority for healthcare practices of all sizes and specialties. Recently published industry…
-
The Rise of Cyber-Insecurity
October is Cybersecurity Awareness Month. It’s a 14-year-old initiative established by the Department of Homeland Security to help raise the profile around various cybersecurity topics. Unfortunately, over the past few…