Do you know your real cyber risk?
If you’re like most companies, you’ve got cyber liability insurance, and if you took your agent’s advice, it’s probably higher than the minimum. So you’re covered, right? Wrong
This author has not written his bio yet.
But we are proud to say that admin contributed 183 entries already.
If you’re like most companies, you’ve got cyber liability insurance, and if you took your agent’s advice, it’s probably higher than the minimum. So you’re covered, right? Wrong
The NIST Cybersecurity Framework (CSF) is a voluntary set of guidelines and best practices designed to help organizations manage and reduce cybersecurity risks.
In today’s world, information technology (IT) literacy has become a basic necessity for employees in almost every industry. As businesses continue to digitize and rely on technology,
In recent years, ransomware attacks have become one of the biggest cyber threats for organizations of all sizes, causing significant financial losses and disrupting business operations. To combat this growing threat,
The recently disclosed Pentagon email breach occurred in 2020 when a hacker gained unauthorized access to an email server used by the United States Department of Defense.
Recently, the Lehigh Valley Health Network (LVHN) was hit by a cybersecurity attack that targeted the Delta Medix group, a provider that LVHN has been working with since 2019. The attack occurred on January 11, 2022, and was discovered by LVHN on January 13, 2022.
When it comes to cyber scams and attacks, by far the most vulnerable are the elderly. We can all help them to be more aware of what to look out for when they do venture online. Here are the most common scams targeting the elderly.
To become HIPAA compliant, your business will need to implement a number of physical, technical, and administrative safeguards to protect the confidentiality, integrity, and availability of protected health information (PHI).
Not all cookies are created equally. As a self-professed chocolate cookie aficionado, I can personally attest to this. But last week, the Department of Health and Services alerted us that cookies may also be bad for our health … information.
Well, this is a little embarrassing… Last week one of our promoted products, password manager LastPass, announced they had suffered a breach through a third-party cloud storage solution. They disclosed an unknown actor gained access to certain customer information, but they didn’t elaborate. They did emphasize that no customer passwords were exposed since those are […]
Three cyber weaknesses you can prevent. The list of computer vulnerabilities is growing rapidly right now. While this is an ongoing trend, the pace has picked up of late. Some may blame Russia, but in truth, they’re just one part of the problem. The reality is the bulk of attacks are for financial gain, and […]
Unsecure Devices Most of you likely know that printers, scanners, and multifunction devices have been a weak link for cybersecurity for many network administrators. There are several reasons for this. First, like many networked medical devices, there was no built-in process for software updates, so when a security vulnerability was identified, few devices received patches. […]
Are You Tired of Hearing It? Just SHUT UP ALREADY – I know some of you are thinking that. We’ve been going on and on about the importance of cybersecurity training, and I know more than a few of you are getting tired of it. So what do we do about that? We DOUBLE down! […]
Beyond Training – You Can’t Stop There. We’ve talked a lot about training lately because it is the single best tool you have to keep your network secure. However, it’s not bulletproof. Two weeks ago Microsoft issued patches for over 85 security weaknesses across all of their Windows operating systems, including patches to close known […]
Three Steps You MUST Take Now. Cybersecurity professionals are sounding the alarm in agreement that we are about to experience another uptick in cybersecurity attacks. They cite numerous reasons for this coming storm. The most significant concern is the increased tensions we have with the usual cast of cyber-attacking state actors – Russia, China, North […]
At a recent discussion in Texas on cybersecurity in healthcare, technology experts were in agreement that cyber threats were increasing and getting more sophisticated. When we consider the options, we can boil them down to two – tighter network lockdowns, and more training.