Archive for the ‘Cyber Security’ Category
Friday, January 13th, 2017
Eleven gigabytes of health data from SOCOM, the US Special Operations Command, was exposed and ripe for hacker pickings. The vulnerability had to do with an unprotected remote syncing service, stemming from an improperly configured backup by Potomac Healthcare, a military subcontractor. The security breach was discovered by Chris Vickery, a white hat hacker who […]
Posted in Blog, Cyber Security, HIPAA | Comments Off on US Spec Ops Health Data Breached
Thursday, January 12th, 2017
How many times have you seen a TV show or movie where a couple of tough guys in leather jackets, maybe carrying baseball bats, walk into a diner or mom and pop shop and demand money? When the owner refuses, they start smashing stuff, and when they’re done they demand protection money to make sure […]
Posted in Blog, Cyber Security | 2 Comments »
Wednesday, January 11th, 2017
Less than a month ago, a major city lost power for a little more than an hour just after midnight, affecting over 200,000 people. A cybersecurity firm claims it was very similar to an incident from a year before, and that Russia is very likely behind it. The attack occurred on December 17 of last year […]
Posted in Blog, Cyber Security | Comments Off on Russian Hackers Shut Down City’s Power
Tuesday, January 10th, 2017
You may recall the tiff between Apple and the FBI following the shooting that took place on December 2, 2015 in San Bernardino, California that left 14 people dead and 22 wounded. The FBI wanted Apple’s help in unlocking the iPhone of Syed Rizwan Farook, one of the shooters, to see what information they could glean […]
Posted in Blog, Cyber Security | Comments Off on FBI Censors Released Documents
Tuesday, January 10th, 2017
One way investigators have of identifying the source of computer hacks is by looking at the code. Last week, malware code connected to cyberattacks the US says were perpetrated by Russia was found in a laptop at an electric company in Vermont. The code was discovered after the Burlington Electric Department received an alert sent out by the […]
Posted in Blog, Cyber Security | 1 Comment »
Friday, December 30th, 2016
On November 7 of this year, Community Health Plan of Washington (CHPW), a nonprofit Medicaid-based health insurance company in Seattle, received a disturbing voicemail, the effects of which are just today being fully realized. The unidentified caller stated that the firm (a subsidiary of NTT Data) who provides technical services to CHPW had a major […]
Posted in Blog, Cyber Security | Comments Off on Data Breach Impacts Nearly 400,000
Thursday, December 29th, 2016
We may never know exactly what happened to American electorate system during 2016, who was responsible, or how it influenced the election. But there was one insight into the 2016 election hacking that will give you a true insight into what happened without any political slant. Plus, if you read more you’ll find out about […]
Posted in Blog, Cyber Security | Comments Off on What You Need to Know About Watering Hole Attacks
Thursday, December 29th, 2016
Would you sign off on a room nurse performing open heart surgery on you? No, right? Then why do you buy devices that connect to the internet when they’re not built by cybersecurity experts? Before we open that can of worms, let’s explain what we’re talking about. Today, in just about every home most people […]
Posted in Blog, Cyber Security | Comments Off on Would You Let a Nurse Perform Your Heart Surgery?
Thursday, December 29th, 2016
The best part of the holidays is that the entire family is in one place, making for some great bonding experiences. Families can cook together, put up decorations, or do whatever Holiday traditions they’ve created over the years. Many families will find themselves sitting down at the dinner table and playing board games like Monopoly, […]
Posted in Blog, Cyber Security | Comments Off on How Industry Security Standards Can Cut Out Human Error
Thursday, December 29th, 2016
When people think of hackers, they think of greasy people stuck to a computer in dark basements all over the world. They think the same thing of the programs hackers use to disrupt people’s lives. Underground. Dirty. Easy to spot as something dangerous. But that’s simply not what all hackers and hacking software look like. […]
Posted in Blog, Cyber Security | Comments Off on Spyware in the Real World
Wednesday, December 28th, 2016
You don’t have to sell stolen personal data on the Dark Web, hold files for ransom or perform DDoS attacks for money in order to make serious cash from hacking. That’s what three Chinese hackers have proven by making about $4 million from US law firms they hacked. The three men: Iat Hong, Bo Zheng and […]
Posted in Blog, Cyber Security | Comments Off on Three Chinese Hackers Made $4M off US Law Firms
Wednesday, December 28th, 2016
When someone says cyberwarfare, you probably think of computers and servers as the soldiers and the casualties being lost data and infected devices. But in the modern world, cyberwarfare can mean those things as well as real soldiers and guns. This month the cyber security firm that helped the DNC investigate the 2016 election hacks, […]
Posted in Blog, Cyber Security | Comments Off on One Ukrainian’s Sad Story of Cybersecurity
Wednesday, December 28th, 2016
It’s no secret that 2016 was a rough year for cybersecurity in the medical field. 21st-century Oncology leaked 2.2 million patients’ information. Premier Healthcare lost unencrypted records for 200,00 patients. Hollywood Presbyterian Medical center shelled out $17,000 after a ransomware attack. And just to name a few. But when we look back on 2016, there […]
Posted in Blog, Cyber Security | Comments Off on The Best Thing to Happen to Hospitals In 2016?
Tuesday, December 27th, 2016
With the year winding down and Christmas and the New Year coming up, it can be easy to forget about 2016 and everything that happened this year. If your holidays are looking great, read our review of 2016 hacking trends to make sure that next year you’ll feel the same way. Ransomware was a top […]
Posted in Blog, Cyber Security | Comments Off on 2016 Hacking Trends
Monday, December 26th, 2016
The year isn’t quite over yet, so there could be a few more attacks, but the year of 2015 saw 57 major cyberattacks against healthcare organizations. 2016 is up to 93 as of the middle of December. That’s a year-to-year increase of 63%, and it will likely get worse. This data was compiled by TrapX […]
Posted in Blog, Cyber Security, HIPAA | Comments Off on Big Jump in Healthcare Cyberattacks in 2016
Monday, December 26th, 2016
Driverless cars have to be one of the most exciting emerging technologies out there. There’s the obvious advantage of being able to work or read or do anything you want while your car drives you, but more importantly auto accidents will plunge once human error is taken out of the equation. There is one very […]
Posted in Blog, Cyber Security | Comments Off on The Malware That Could Crash Your Car
Thursday, December 22nd, 2016
In the Dark Knight, there is a scene where two ferries full of people cross a river to escape from Gotham before the Joker does something terrible. Unfortunately for the people on the boat, that was exactly what the Joker was planning on. While they’re in the middle of the river both boats lose their […]
Posted in Blog, Cyber Security | Comments Off on What Would You Do to Save Your Data?
Wednesday, December 21st, 2016
This month, all of the top healthcare security executives got together at the Privacy and Security Forum in Boston to discuss the challenges that the healthcare industry is facing. Joel Brenner, who was a former senior counsel member at the NSA, keynoted the event and made one thing very clear in his speech. The cybersecurity […]
Posted in Blog, Cyber Security | Comments Off on Why You Should Bring a Baseball Bat to Your Office
Tuesday, December 20th, 2016
You’ve secured your network. You’ve made sure dangerous phishing emails won’t ever make it into your inbox. Your data is backed up and secure. You know that hackers are always finding new ways to sneak into private information. Even if you do all these things and are aware of the dangers you face, I have […]
Posted in Blog, Cyber Security | Comments Off on The Most Dangerous Present Under Your Christmas Tree This Year
Monday, December 19th, 2016
Two top Senators have begun actively campaigning for a bipartisan Senate select committee to look into the role Russia played in releasing hacked emails from the DNC to influence the recent presidential election in favor of Donald Trump. Senator John McCain, a former presidential candidate and current chairman of the Senate Armed Services Committee, took to […]
Posted in Blog, Cyber Security | Comments Off on Senate Reactions to Russia’s Election Interference