-
Cybersecurity Webinar Recap: New Attack Methods
Last year, Ginni Rometty, IBM’s chairman, president and CEO, said, “Cybercrime is the greatest threat to every company in the world.“ And she was right. CSO cites that during the next…
-
Petya Ransomware Affecting Businesses Across the Globe
On Tuesday, June 27, a new wave of ransomware, known as Petya, started affecting Ukraine businesses with spillover to other countries including the USA. This new attack makes use of…
-
7 Tips to Manage Mobile Security
Are you reading this blog from your phone or tablet? If so, you’re in good company. Mobile devices accounted for 51 percent of internet usage worldwide in October compared to…
-
Social Engineering: How to Protect Your Practice from an Attack
Remember the great con-artist, Gregor MacGregor, known as the “king of all con-men?” He convinced people to invest in an entirely fictitious country that he had conjured up. More recently,…
-
“WannaCry” Malware Infestation Affects Systems Around the Globe
On Friday May 12, a new Malware infestation, dubbed “WannaCry”, began affecting systems in Europe and Asia. Though some action was taken to shut down the initial variant of this…
-
The Preferred Security Tools in Healthcare
Security challenges and data privacy continue to be leading concerns for healthcare organizations. Now that an individual medical record can go for an average of $363 on the black market,…
-
6 Ways Clinics Effectively Manage Compliance
While the No. 1 priority of healthcare practices is patient satisfaction, compliance continues to be a significant focus for practices across the nation. Modern Healthcare reports that in 2016, there…
-
How You Can Protect Your Practice or Firm with Whitelisting
Antivirus software is about 40 percent effective, according to ZueS Tracker, a tool that tracks malicious hosts. This statistic is startling, especially for organizations that rely almost solely on antivirus…
-
5 Security Risk Analysis Myths
Risk assessment and risk analysis are often used interchangeably. Although HIPAA risk analysis and risk assessment are terms that closely resemble each other, there are significant differences between the two.
-
Top 4 Healthcare Data Breaches in 2016
You think your data is safe. Then you get the call every healthcare organization dreads and hear the words: There has been a security breach. What would you do? Nearly…
-
Minimize Risk in Your Practice’s “Bring Your Own Device” Policy
Consumers have more device options than ever and with the recent launch of the iPhone 7 and the holidays, it won’t be long before workplaces are flooded with new devices.…
-
Are You Using a Password Manager?
How many passwords do you have? They have become essential for many websites that we login to, change often and can be hard to keep straight. Although passwords can feel…