.wp-post-image{display:none;}
February 2019 Newsletter
December 2018 Newsletter
.wp-post-image{display:none;}
Protecting Patient Information in the Age of Breaches
In recent times, over 1,000 health care organizations have experienced network breaches causing overwhelming amounts of protected health data to be compromised. Infiltrating the networks of health care facilities is an alarming trend among hackers, but what is the allure? Health care facilities carry some of the most sensitive reserves of data files across the board, supplying hackers with the kind of sensitive information that has limitless potential to not only effect the health care organization that they have infiltrated, but also the patients involved in the breach.
HIPAA Physical Safeguards: Policies and Procedures to Protect from Physical Threats [Infographic]
Today we will talk about Physical Safeguards which primarily deals with the physical access to Protected Health Information (PHI). All the PHI gathered electronically or on paper must be housed in some physical location. Physical safeguards are set of rules and guidelines which outlines how the physical storage and access to the PHI would be managed.
October 2018 Newsletter
.wp-post-image{display:none;}
June 2018 Newsletter
Today’s small and midsize businesses(SMBs) have an uneasy relationship withtechnology – even if they don’t realizeit yet. As the marketplace reaches new heights of complexity and speed, and consumers migrate to cyberspace en masse to make their buying decisions, SMBs are responding in turn.
Scam Of The Week: GDPR Phishing Attack with Apple Flavor / Royal Wedding
Social engineering follows seasonal patterns. It's also connected to major events. We see this every year with holiday-themed phishing attacks between Thanksgiving and New Year's Day.
We're seeing it now with this week's implementation of GDPR, the European Union's General Data Protection Regulation.
Scam Of The Week: World’s Largest Phishing Botnet Grows
The notorious Necurs botnet is one of the oldest and largest spam and phishing delivery systems in existence. It controls millions of machines that the criminal botmasters use to send malicious payloads. Necurs has now adopted a retro trick to make itself more evasive and less likely to have its phishing intercepted by your filters.