Subscribe
Best Cybersecurity Development for Hospitals in 2016

Best Cybersecurity Development for Hospitals in 2016


Posted December 28, 2016 in NIST, Ransomware, Malware, Data Breach

Despite a rough year for healthcare security, one major development gave hospitals better protection. Learn what...

FERPA Explained: Student Data Privacy Laws You Must Know

FERPA Explained: Student Data Privacy Laws You Must Know


Posted December 27, 2016 in HIPAA, Compliance, Malware

The University of Minnesota boycott exposed how student privacy laws like FERPA affect everyone. Understand the...

2016 Hacking Trends Every Business Should Know

2016 Hacking Trends Every Business Should Know


Posted December 27, 2016 in HIPAA, Ransomware, Malware, Data Breach

From ransomware surges to nation-state attacks, 2016 saw major shifts in cybercrime. Review the top hacking trends...

Healthcare Cyberattacks Doubled in 2016: Full Report

Healthcare Cyberattacks Doubled in 2016: Full Report


Posted December 26, 2016 in HIPAA, Ransomware, Malware, Data Breach

Healthcare cyberattacks surged in 2016 with major breaches nearly doubling. See the full breakdown and what medical...

Driverless Car Malware: Hacking Autonomous Vehicle Systems

Driverless Car Malware: Hacking Autonomous Vehicle Systems


Posted December 26, 2016 in Malware, Data Breach, Cloud Security

Malware targeting driverless cars could turn exciting technology into a deadly weapon. Learn how hackers threaten...

Ransomware Dilemma: Would You Pay to Save Your Data?

Ransomware Dilemma: Would You Pay to Save Your Data?


Posted December 22, 2016 in Ransomware, Cryptocurrency, Bitcoin, Data Breach

Like the Dark Knight ferry scene, ransomware forces impossible choices about your data. Explore the ethical and...

Healthcare Security Leadership: Unconventional Defense Tactics

Healthcare Security Leadership: Unconventional Defense Tactics


Posted December 21, 2016 in HIPAA, Compliance, Malware, Data Breach

Top healthcare security executives gathered in Boston to discuss emerging cybersecurity challenges. Discover the bold...

The Most Dangerous Tech Gift Under Your Tree

The Most Dangerous Tech Gift Under Your Tree


Posted December 20, 2016 in Malware, Data Breach, Compliance

Smart devices make great gifts but create serious security risks for your home network. Learn which gadgets are...