Post Image

5 Items Missing From Your Information Security Threat Vulnerability Assessments

Where does your average information security professional spend the majority of their time? If you guessed monitoring or compliance activities, you're unfortunately wrong.

Self-created security vulnerabilities are actually the biggest time commitment for today's security professionals, according to recent CSO research. While 73% believe their organizations are likely to fall victim to attack in the next year, almost a third feel like they are "completely underwater."

Read More
Post Image

5 Facts About File Integrity Monitoring and HIPAA Integrity Controls

The risks of being found noncompliant with HIPAA guidelines are among the most pressing issues for healthcare IT professionals. In the event of a data breach, HIPAA fines can exceed $1.5 million. To compound matters, the Department of Health and Human Services Office for Civil Rights (OCR) has recently begun the second phase of random HIPAA audits, which will involve a combination of both written requests and on-site visits. That means now is the time for organizations to ensure they're compliant with all HIPAA requirements.

Read More
Post Image

Cybercrime, Cybersecurity: Everything Cyber

Though no longer a new idea, the Internet of Things (IoT) is also far from being a mature idea. With predictions listing the total number of active, installed, wireless connected devices doubling from the 16 billion in 2015, the thought of cybercrime and cybersecurity can escape no one. Daily reports showing the latest trends and statistics continue to pour in. The latest reports estimate the global cyber security market to grow to USD 202.36 billion by 2021, at a Compound Annual Growth Rate (CAGR) of 10.6%.

Read More
Post Image

The Most Effective Weapons Against Ransomware

Ransomware can represent a near-guaranteed and easy payload for some of the world's most sophisticated cybercriminals. This method of attack involves the encryption of data and a demand for a financial payoff in the range of hundreds to thousands of dollars.

For IT professionals, it's important to understand how this recent spike in malware attacks has the potential to impact your firm if you're unprepared. Join us as we review the state of ransomware and how businesses can be prepared.

Read More
Post Image

Why Ransomware Attacks on Hospitals Will Increase and The Best Ways to Stop It

In February 2016, the Hollywood Presbyterian Medical Center realized something was terribly wrong. Their systems had become the victim of ransomware, and as a result, hospital communications were effectively shut down.

Despite alerting law enforcement and engaging the help of cybersecurity experts, Hollywood Presbyterian eventually ag reed to pay the ransom; 40 Bitcoins - the equivalent of $17,000.00. Since the rise of untraceable and anonymous Bitcoin transfers, high-profile targets are on the rise. And since that $17,000 payout, other hackers have started to take notice.

Read More
Post Image

The Driving Force of Cybercrime

Where to Begin

The year 1998 brought about change for the technology industry. Google became incorporated. MySQL was released allowing for an open source, downloadable database. 3DES, also known as Triple Data Encryption Algorithm, was published. We also saw the beginning of weblogs, or blogs as they are currently known, and we were first introduced to the creators of VMware.

Read More