Subscribe
7 Tips to Avoid Being a Data Breach Victim

7 Tips to Avoid Being a Data Breach Victim


Posted June 29, 2016 in Data Breach, HIPAA, Malware

Data breaches have exposed millions of patient records. Follow these seven essential tips from Petronella to protect...

Mobile Account Hijacking: A New Identity Theft Threat

Mobile Account Hijacking: A New Identity Theft Threat


Posted June 28, 2016 in Compliance, Data Breach, Malware

Criminals hijack mobile phone accounts to launder money and steal identities. Learn how this growing threat works and...

Intel Admits Its Antivirus Software Is Useless

Intel Admits Its Antivirus Software Is Useless


Posted June 28, 2016 in Ransomware, Malware, Data Breach

Intel CEO acknowledges their antivirus technology has failed. Learn why traditional antivirus is no longer enough and...

Why Healthcare Is the #1 Cyber Attack Target

Why Healthcare Is the #1 Cyber Attack Target


Posted June 24, 2016 in Ransomware, HIPAA, Data Breach

Hospitals and medical practices are the top targets for cybercriminals. Discover why healthcare data is so valuable...

Cyber Ransom Insurance: Does Your Business Need It?

Cyber Ransom Insurance: Does Your Business Need It?


Posted June 21, 2016 in Ransomware, HIPAA, Compliance

With ransomware targeting healthcare organizations, cyber liability insurance is critical. Learn what it covers and...

Invisible ATM Skimmers: How to Protect Your Cards

Invisible ATM Skimmers: How to Protect Your Cards


Posted June 16, 2016 in Data Breach, Malware, Cloud Security

New ATM skimmers are invisible to the naked eye and spreading to major retailers. Learn how to spot them and protect...

HIPAA Rules After a Tragedy: Common Misconceptions

HIPAA Rules After a Tragedy: Common Misconceptions


Posted June 16, 2016 in HIPAA, Compliance, NIST

The Orlando tragedy raised questions about HIPAA and patient information sharing. Learn the common misconceptions...

Pentagon Bug Bounty Reveals 100+ Vulnerabilities

Pentagon Bug Bounty Reveals 100+ Vulnerabilities


Posted June 15, 2016 in Penetration Testing, Data Breach, Malware

1,400 hackers found over 100 weaknesses in Pentagon networks through a sanctioned bug bounty program. See what they...