Archive for 2017

Don’t Let Your Computer Become a Bitcoin Mine

Thursday, May 4th, 2017

Have you ever looked at America’s debt clock? Take a seat before you do, because it’s the type of horror that you can’t put into words. The basic idea behind governments issuing money is that a government has assets worth a certain amount. They print and issue money that represents the same value of a […]

Don’t Open That Google Doc!

Thursday, May 4th, 2017

A new phishing campaign is making the rounds, fooling tons of Google users into giving hackers access to their Gmail accounts. Here’s how it works. You get an email from someone you know who has sent you a Google Doc attachment. When you click the attachment, you go to a page that looks like a Google […]

5.7 Million Reasons To Take Cyber-Security Seriously

Thursday, May 4th, 2017

When a company is hit by a cyber-attack, it’s embarrassing. It doesn’t matter if they took the proper precautions and were just unlucky, when one company is hacked and another is not the company that hasn’t been hit is going to be more attractive to customers no matter what. Don’t believe it? Check out our […]

Are Healthcare Providers Putting All Their Eggs In One Basket?

Thursday, April 27th, 2017

Want to know why databases are dangerous? It’s as simple as putting all your eggs in one basket. If something happens to that basket, you’re out of eggs. But when it comes to databases, those eggs are people’s information. Email addresses, phone numbers, and full names are stored in a database and also happen to […]

Are Banks in Trouble?

Thursday, April 20th, 2017

With rising concerns over troubled financial institutions, many people may decide that burying their money in the desert a la Heisenberg might be a more practical solution than trusting their bank.  However, it might not be time – not just yet, anyway. Regardless of the many bankruptcies, takeovers, and mergers, most of our banks are still […]

How the Government Told the World You Left Your Window Open

Tuesday, April 18th, 2017

Imagine that your neighbors agreed to look after your home while you were away on vacation.  Now imagine that they noticed a window was unlocked, and instead of locking it for you, they posted on Facebook about seeing it unlocked, leaving your home vulnerable to anyone who may have read the post. Now let’s say […]

Build A Wall Around Your Data, Not a Fence

Monday, April 17th, 2017

In the past, we’ve told you about how manufacturers won’t make safer IOT devices until consumers demand it. We’ve also told you that downloading apps without verifying them might not hurt you now, but is the first crack that will lead to a larger breach in the future. Unfortunately, those facts are now combining into […]

Some Good IT Security News for Healthcare Providers-For a Change

Monday, April 17th, 2017

Given the state of Healthcare IT security, if you’re in the healthcare industry you could probably use some good news. We recently posted an article on Blockchain and how it could be Healthcare’s answer to ransomware attacks. Blockchain worked by storing data in thousands of different places and also created unalterable records. That means that […]

Bank Website Stolen by Hackers

Wednesday, April 12th, 2017

When you log into a bank website, you probably don’t spend too much time worrying about the security of your information, right? How would you feel if a bank’s entire online presence had been compromised and was sending you malware? That’s what happened to one Brazilian bank. They didn’t just get hacked or hijacked, they […]

Chicago Med Faces Ransomware

Monday, April 10th, 2017

You know an issue is getting big when it’s featured on a primetime network TV show. That’s just what happened on a recent episode of NBC’s Chicago Med, where the hospital faces the fallout of becoming a victim of ransomware. You can watch the full episode for free here on Hulu.  

The Cracks in Your Network that Could Turn into Gaping Holes

Monday, April 10th, 2017

We often talk about hackers who breach networks and completely shut them down or steal personal information, but if every hack was that damaging most people would have sworn off technology by now. Even though every week we hear about another company that’s had a breach that will cost them millions, there are thousands of […]

The Best Thing to Happen to Hospitals in the Last Year?

Thursday, April 6th, 2017

It’s no secret that 2016 was a rough year for cybersecurity in the medical field. 21st century Oncology leaked 2.2 million patients’ information. Premier Healthcare lost unencrypted records for 200,00 patients. Hollywood Presbyterian Medical center shelled out $17,000 after a ransomware attack. And just to name a few. But when we look back on 2016, […]

Don’t Get Caught Off Guard with PCI DSS Compliance

Monday, April 3rd, 2017

There are a ton of people out there who hear about hacking and assume that since they’re an average person at a small company, they’ll never have to worry about cybercrime. In their mind, as long as they protect their identity online and cancel any lost credit cards they’ll never have to deal with the […]

Cybercrime’s Next Target

Thursday, March 30th, 2017

The good news: cyberattacks on healthcare organizations have dropped. The bad news: cybercriminals have a new target. The information comes from figures released from IBM’s X-Force Thread Intelligence Index, which shows that healthcare cyberattacks peaked in 2015. It’s still a major target, but as larger organizations are increasing their security, attacks have turned to smaller […]

Updated Ransomware Plays Hide and Seek

Thursday, March 30th, 2017

Cerber is one of the more popular variations of ransomware. A new version has been detected, and it has a few new tricks up its sleeve. The latest version of Cerber extracts itself from a hacker-owned Dropbox account. The self-extraction makes it look safe to machine-learning tools, which is one way it avoids detection. It also checks […]

Wikileaks Dump Shows iPhone Vulnerabilities Exploited by CIA

Thursday, March 30th, 2017

WikiLeaks’ DarkMatter dump brought some interesting revelations to light, most notably was the fact that the CIA has been working with Apple since 2008, a mere year after its release, to hack the iPhone. One such example of this is the malware entitled “NightSkies,” a virus that would allow the hacker to have full control […]

New Kind Ransomware, Scareware, on Safari

Tuesday, March 28th, 2017

Have you ever gotten a popup window while using Safari on your iPhone or iPad, telling you that you have to pay a fee to regain access to your browser? Leaving aside any judgment on the kinds of websites or online activities you that are usually involved that result in getting it, if you’ve seen […]

A Cybersecurity Storm Is Hammering Your Roof. Will You Find The Leaks Before It’s Too Late?

Monday, March 27th, 2017

There’s a cybersecurity storm hammering your roof, will you find and fix the leaks in your network before they cause major damage? If you’re a homeowner, then you know that leaks are inevitable. No matter what you do your roof is going to have some soft spots due to simple wear and tear. If there’s […]

Cloud Computing: The Fall of Hospital Datacenters

Thursday, March 23rd, 2017

Hospital datacenters could go the way of rotary phones and VCRs in the very near future, as brick and mortar make way for the cheaper and more convenient cloud. John Halamka, MD, CIO of Count Beth Israel Deaconess Medical Center predicts that the centers could become obsolete within the next five years, stating that the […]

iPhone Users Double-Victimized

Thursday, March 23rd, 2017

iPhone thieves may be able to pick up an iPhone, but thanks to “Find my iPhone,” breaking into them is such a headache.   However, where there is a will, there is a way. A scam was recently discovered: one that involves stealing the victim’s Apple iCloud username and password after the theft of the […]