Archive for 2017
Thursday, May 4th, 2017
Have you ever looked at America’s debt clock? Take a seat before you do, because it’s the type of horror that you can’t put into words. The basic idea behind governments issuing money is that a government has assets worth a certain amount. They print and issue money that represents the same value of a […]
Posted in Blog, Cyber Security | Comments Off on Don’t Let Your Computer Become a Bitcoin Mine
Thursday, May 4th, 2017
A new phishing campaign is making the rounds, fooling tons of Google users into giving hackers access to their Gmail accounts. Here’s how it works. You get an email from someone you know who has sent you a Google Doc attachment. When you click the attachment, you go to a page that looks like a Google […]
Posted in Blog, Cyber Security | Comments Off on Don’t Open That Google Doc!
Thursday, May 4th, 2017
When a company is hit by a cyber-attack, it’s embarrassing. It doesn’t matter if they took the proper precautions and were just unlucky, when one company is hacked and another is not the company that hasn’t been hit is going to be more attractive to customers no matter what. Don’t believe it? Check out our […]
Posted in Blog, Cyber Security | Comments Off on 5.7 Million Reasons To Take Cyber-Security Seriously
Thursday, April 27th, 2017
Want to know why databases are dangerous? It’s as simple as putting all your eggs in one basket. If something happens to that basket, you’re out of eggs. But when it comes to databases, those eggs are people’s information. Email addresses, phone numbers, and full names are stored in a database and also happen to […]
Posted in Blog, HIPAA | Comments Off on Are Healthcare Providers Putting All Their Eggs In One Basket?
Thursday, April 20th, 2017
With rising concerns over troubled financial institutions, many people may decide that burying their money in the desert a la Heisenberg might be a more practical solution than trusting their bank. However, it might not be time – not just yet, anyway. Regardless of the many bankruptcies, takeovers, and mergers, most of our banks are still […]
Posted in Blog, Cyber Security | Comments Off on Are Banks in Trouble?
Tuesday, April 18th, 2017
Imagine that your neighbors agreed to look after your home while you were away on vacation. Now imagine that they noticed a window was unlocked, and instead of locking it for you, they posted on Facebook about seeing it unlocked, leaving your home vulnerable to anyone who may have read the post. Now let’s say […]
Posted in Blog, Cyber Security | Comments Off on How the Government Told the World You Left Your Window Open
Monday, April 17th, 2017
In the past, we’ve told you about how manufacturers won’t make safer IOT devices until consumers demand it. We’ve also told you that downloading apps without verifying them might not hurt you now, but is the first crack that will lead to a larger breach in the future. Unfortunately, those facts are now combining into […]
Posted in Blog, Cyber Security | Comments Off on Build A Wall Around Your Data, Not a Fence
Monday, April 17th, 2017
Given the state of Healthcare IT security, if you’re in the healthcare industry you could probably use some good news. We recently posted an article on Blockchain and how it could be Healthcare’s answer to ransomware attacks. Blockchain worked by storing data in thousands of different places and also created unalterable records. That means that […]
Posted in Blog, Cyber Security | Comments Off on Some Good IT Security News for Healthcare Providers-For a Change
Wednesday, April 12th, 2017
When you log into a bank website, you probably don’t spend too much time worrying about the security of your information, right? How would you feel if a bank’s entire online presence had been compromised and was sending you malware? That’s what happened to one Brazilian bank. They didn’t just get hacked or hijacked, they […]
Posted in Social | Comments Off on Bank Website Stolen by Hackers
Monday, April 10th, 2017
You know an issue is getting big when it’s featured on a primetime network TV show. That’s just what happened on a recent episode of NBC’s Chicago Med, where the hospital faces the fallout of becoming a victim of ransomware. You can watch the full episode for free here on Hulu.
Posted in Blog, Cyber Security | Comments Off on Chicago Med Faces Ransomware
Monday, April 10th, 2017
We often talk about hackers who breach networks and completely shut them down or steal personal information, but if every hack was that damaging most people would have sworn off technology by now. Even though every week we hear about another company that’s had a breach that will cost them millions, there are thousands of […]
Posted in Blog, Cyber Security | Comments Off on The Cracks in Your Network that Could Turn into Gaping Holes
Thursday, April 6th, 2017
It’s no secret that 2016 was a rough year for cybersecurity in the medical field. 21st century Oncology leaked 2.2 million patients’ information. Premier Healthcare lost unencrypted records for 200,00 patients. Hollywood Presbyterian Medical center shelled out $17,000 after a ransomware attack. And just to name a few. But when we look back on 2016, […]
Posted in Blog, Cyber Security | Comments Off on The Best Thing to Happen to Hospitals in the Last Year?
Monday, April 3rd, 2017
There are a ton of people out there who hear about hacking and assume that since they’re an average person at a small company, they’ll never have to worry about cybercrime. In their mind, as long as they protect their identity online and cancel any lost credit cards they’ll never have to deal with the […]
Posted in Blog, Cyber Security | Comments Off on Don’t Get Caught Off Guard with PCI DSS Compliance
Thursday, March 30th, 2017
The good news: cyberattacks on healthcare organizations have dropped. The bad news: cybercriminals have a new target. The information comes from figures released from IBM’s X-Force Thread Intelligence Index, which shows that healthcare cyberattacks peaked in 2015. It’s still a major target, but as larger organizations are increasing their security, attacks have turned to smaller […]
Posted in Blog, Cyber Security | Comments Off on Cybercrime’s Next Target
Thursday, March 30th, 2017
Cerber is one of the more popular variations of ransomware. A new version has been detected, and it has a few new tricks up its sleeve. The latest version of Cerber extracts itself from a hacker-owned Dropbox account. The self-extraction makes it look safe to machine-learning tools, which is one way it avoids detection. It also checks […]
Posted in Blog, Cyber Security | Comments Off on Updated Ransomware Plays Hide and Seek
Thursday, March 30th, 2017
WikiLeaks’ DarkMatter dump brought some interesting revelations to light, most notably was the fact that the CIA has been working with Apple since 2008, a mere year after its release, to hack the iPhone. One such example of this is the malware entitled “NightSkies,” a virus that would allow the hacker to have full control […]
Posted in Blog, Cyber Security | Comments Off on Wikileaks Dump Shows iPhone Vulnerabilities Exploited by CIA
Tuesday, March 28th, 2017
Have you ever gotten a popup window while using Safari on your iPhone or iPad, telling you that you have to pay a fee to regain access to your browser? Leaving aside any judgment on the kinds of websites or online activities you that are usually involved that result in getting it, if you’ve seen […]
Posted in Blog, Cyber Security | Comments Off on New Kind Ransomware, Scareware, on Safari
Monday, March 27th, 2017
There’s a cybersecurity storm hammering your roof, will you find and fix the leaks in your network before they cause major damage? If you’re a homeowner, then you know that leaks are inevitable. No matter what you do your roof is going to have some soft spots due to simple wear and tear. If there’s […]
Posted in Blog, Cyber Security | Comments Off on A Cybersecurity Storm Is Hammering Your Roof. Will You Find The Leaks Before It’s Too Late?
Thursday, March 23rd, 2017
Hospital datacenters could go the way of rotary phones and VCRs in the very near future, as brick and mortar make way for the cheaper and more convenient cloud. John Halamka, MD, CIO of Count Beth Israel Deaconess Medical Center predicts that the centers could become obsolete within the next five years, stating that the […]
Posted in Blog | Comments Off on Cloud Computing: The Fall of Hospital Datacenters
Thursday, March 23rd, 2017
iPhone thieves may be able to pick up an iPhone, but thanks to “Find my iPhone,” breaking into them is such a headache. However, where there is a will, there is a way. A scam was recently discovered: one that involves stealing the victim’s Apple iCloud username and password after the theft of the […]
Posted in Blog, Cyber Security | Comments Off on iPhone Users Double-Victimized
Page 7 of 11« First«...56789...»Last »