As the digital ecosystem continues to grow, so do cyber security threats. With more data and apps moving to the cloud—accessible by an increasingly savvy class of hackers—companies worldwide are wondering how to manage what seems like an insurmountable cyber threat. Some say a more laissez faire approach to security management might be the key. If that sounds crazy, hear …
Key Takeaways from Cisco’s Cybersecurity Annual Report
In January, Cisco published its 2017 Annual Cybersecurity Report, which gave a rundown of the challenges that face Chief Security Officers (CSOs) in today’s digital work environment. As part of the report, some 3,000 CSOs and security operations leaders from around the world shared their insights on what is plaguing their company. Headaches ranged from new emerging threats to chronic …
Fifty Percent of Businesses Report Ransomware Attacks in Past Year
In 2016, ransomware was one of the most successful forms of cybercrime. And in 2017, that continues to be the case. Ransomware has affected a reported half of all businesses in the last year, with many having been hit more than three times already. That sobering statistic comes from the Global Ransomware Study 2016 from Sentinel One, which suggests a …
The Risks of Playing Fast and Loose with Security Compliance
Data is a lot like currency in business today, and you wouldn’t leave wads of cash lying around, right? This about this: Do you collect data efficiently? How do you appropriate it wisely? How do you use it to improve or validate your business case decisions? How do you store it? Who has access? All good questions, but we’re going …
Cyber Resiliency: Key to Business Success
Cyber security spending has increased dramatically in the United States in the last five years, and for good reason. Studies show attacks cost businesses as much as $400 billion per year, with five out of every six large companies attacked in 2014 alone. But hacks can be detrimental to businesses, regardless of size, costing more than money—many do irreparable damage …
Health IoT Adoption in the HIPAA Compliance Landscape
By 2022, the healthcare IoT will likely reach a valuation close to half of a trillion dollars. While many advancements push the connected healthcare market forward, ePHI (electronic protected health information) security remains a distinct challenge. Discover the Growing Healthcare IoT Market Also known as IoMT (Internet of Medical Things), the healthcare IoT market puts sensor capabilities and big data …
Improving Cyber Security Protections with Predictive Analytics
Let’s face it: cyber security isn’t sexy. Most of us would prefer to focus on implementing cool developments in big data, artificial intelligence, and machine learning in our day-to-day work lives. But the fact remains that none of those developments will amount to much if we aren’t able to keep our information safe—which is why cyber security remains so critical. …
Are Healthcare Ransomware Attacks HIPAA Data Breaches?
It was estimated that 4,000 daily ransomware attacks occurred in 2016, according to the U.S. Government Interagency Guidance Document, “How to Protect Your Networks from Ransomware.” That’s a 300 percent increase over the 1,000 daily ransomware attacks reported in 2015. As a result, covered entities (CEs) and business associates (BAs) are wondering whether ransomware attacks on private health information (PHI) …
How to Tech Guide: Encryption for Data Security – Part 1
What role does encryption play in data security? Widespread connectivity creates many entryways for cybercriminals to hack your network. When data falls into the wrong hands, the consequences can be devastating. Accounting for all of the traveling data across your computers, mobile devices, databases and cloud systems is a serious challenge. Luckily, there are tried-and-true methods to safeguard your assets—and …
Your Printer: The Security Weak Spot You Forgot About
A printer seems innocuous most of the time, but last year’s DDoS attack showed us that any connected device could fall prey to hackers. Every business has at least one printer connected to a network, and some have more than that. The printer in the corner could be the security weak spot you haven’t thought about protecting. Printers, scanners, and …