Protecting Healthcare Networks Against Threats
In today’s digitally connected world, cybersecurity is a critical concern for all industries. However, for the healthcare industry, the failure to ensure resilience against cyber threats could be a matter of life and death. According to a 2018 Thales Security Report, a staggering 77% of US healthcare organizations have been breached at some point in […]
Safeguarding the Nation’s Critical Infrastructure
The resilience of critical infrastructure is a key factor in the security of any nation. The US security infrastructure has sixteen sectors whose assets, systems, and networks influence food supply, water, financial services, public health, power and more. Previously, cybercriminals used to ignore local sectors like state/municipal governments and first responders to go after larger […]
Cybersecurity Professionals: Path to Job Security
Checking the news these days can be a scary proposition. With daily headlines about major corporate breaches, ransomware, and cryptojacking, consumers are very worried about the privacy of their data and security of their digital assets. According to one recent market report, global cybersecurity spending will exceed $1 trillion dollars from 2017 to 2021. Cybersecurity […]
3 Ways to Attempt BYOD and IoT Security
A decade ago, when smartphones started to penetrate the corporate world, IT managers had to consider the implications of Bring Your Own Device (BYOD) for their organization’s security. Now the proliferation of the Internet of Things (IoT) or connected devices has added an additional layer of complexity. Organizations are trying to keep pace with the […]
What should school districts know about CIPA compliance?
Technological advancements including mobile devices, intelligent software and other learning tools are changing the way educators teach and shifting the way students participate in their own education. As institutions continue to add more innovative endpoints and platforms, it’s important that they also consider the requirements of the Children’s Internet Protection Act. CIPA is critical for […]
3 Network Horror Stories that Keep IT Up at Night
Any horror fan knows that the best – not to mention most bone-chilling – stories are always rooted in truth. The same is true for network attacks and breaches, which help to paint painful lessons for any company’s IT department. These are the frightening real-life tales that keep IT workers up at night, contemplating the […]
What can hospitals learn from the Kansas Heart Hospital breach?
It’s a story similar to many others that have been taking place over the last few years. Employees and executives come into their place of business like any other day, only to realize that the critical data they need to do their jobs is locked away under the watchful eyes of cybercriminal encryption. Kansas Heart […]
4 things all nonprofits need to know about network security
Nonprofits face unique challenges when it comes to ensuring network security. Unlike many organizations in the private sector, nonprofits need to create a secure network environment on a tight budget and often without the assistance of a dedicated IT staff. Still, ensuring network security is just as important for charities and other not-for-profit organizations as […]
How to keep ransomware attacks away from backups
Since its emergence, the numerous variants of ransomware have wreaked havoc on networks and computers worldwide. By encrypting files and not releasing them until a ransom is paid, ransomware has proven to be especially effective and lucrative for cybercriminals. Even backups are no longer safe from ransomware. But, with a little knowledge and the right […]
4 ways to stop insider threats
Most discussions around data breaches and cybercriminal activity focus on external players like hackers. But, this is only skimming the surface regarding the multitudinous threats that organizations face today. In fact, insiders are increasingly playing a large, outsized role in many data leaks. According to the 2016 Data Breach Investigations Report from Verizon, insider threats […]