View Post

Not All Threats Are Created Equal

In Security by Daniel NewmanLeave a Comment

As the digital ecosystem continues to grow, so do cyber security threats. With more data and apps moving to the cloud—accessible by an increasingly savvy class of hackers—companies worldwide are wondering how to manage what seems like an insurmountable cyber threat. Some say a more laissez faire approach to security management might be the key. If that sounds crazy, hear …

View Post

Key Takeaways from Cisco’s Cybersecurity Annual Report

In Security by Daniel NewmanLeave a Comment

In January, Cisco published its 2017 Annual Cybersecurity Report, which gave a rundown of the challenges that face Chief Security Officers (CSOs) in today’s digital work environment. As part of the report, some 3,000 CSOs and security operations leaders from around the world shared their insights on what is plaguing their company. Headaches ranged from new emerging threats to chronic …

View Post

Fifty Percent of Businesses Report Ransomware Attacks in Past Year

In Security by Shelly Kramer2 Comments

In 2016, ransomware was one of the most successful forms of cybercrime. And in 2017, that continues to be the case. Ransomware has affected a reported half of all businesses in the last year, with many having been hit more than three times already. That sobering statistic comes from the Global Ransomware Study 2016 from Sentinel One, which suggests a …

View Post

Cyber Resiliency: Key to Business Success

In Security by Daniel NewmanLeave a Comment

Cyber security spending has increased dramatically in the United States in the last five years, and for good reason. Studies show attacks cost businesses as much as $400 billion per year, with five out of every six large companies attacked in 2014 alone. But hacks can be detrimental to businesses, regardless of size, costing more than money—many do irreparable damage …

View Post

Health IoT Adoption in the HIPAA Compliance Landscape

In Security by Carolina Curby-LucierLeave a Comment

By 2022, the healthcare IoT will likely reach a valuation close to half of a trillion dollars. While many advancements push the connected healthcare market forward, ePHI (electronic protected health information) security remains a distinct challenge. Discover the Growing Healthcare IoT Market Also known as IoMT (Internet of Medical Things), the healthcare IoT market puts sensor capabilities and big data …

View Post

Improving Cyber Security Protections with Predictive Analytics 

In Security by Daniel NewmanLeave a Comment

Let’s face it: cyber security isn’t sexy. Most of us would prefer to focus on implementing cool developments in big data, artificial intelligence, and machine learning in our day-to-day work lives. But the fact remains that none of those developments will amount to much if we aren’t able to keep our information safe—which is why cyber security remains so critical. …

View Post

Are Healthcare Ransomware Attacks HIPAA Data Breaches?

In Security by Bobby BoughtonLeave a Comment

It was estimated that 4,000 daily ransomware attacks occurred in 2016, according to the U.S. Government Interagency Guidance Document, “How to Protect Your Networks from Ransomware.” That’s a 300 percent increase over the 1,000 daily ransomware attacks reported in 2015. As a result, covered entities (CEs) and business associates (BAs) are wondering whether ransomware attacks on private health information (PHI) …

View Post

How to Tech Guide: Encryption for Data Security – Part 1

In Security by Nikola TodevLeave a Comment

What role does encryption play in data security? Widespread connectivity creates many entryways for cybercriminals to hack your network. When data falls into the wrong hands, the consequences can be devastating. Accounting for all of the traveling data across your computers, mobile devices, databases and cloud systems is a serious challenge. Luckily, there are tried-and-true methods to safeguard your assets—and …

View Post

Your Printer: The Security Weak Spot You Forgot About

In Security by Daniel NewmanLeave a Comment

A printer seems innocuous most of the time, but last year’s DDoS attack showed us that any connected device could fall prey to hackers. Every business has at least one printer connected to a network, and some have more than that. The printer in the corner could be the security weak spot you haven’t thought about protecting. Printers, scanners, and …