In a recent article that appeared in Healthcare IT News, HyTrust, a company specializing in encryption for storage and virtual environments, conducted that found there was a rise in the percentage of Healthcare organizations planning on moving some of their applications to the cloud. Continue reading Increase Cloud Adoption Formula in Healthcare with greater Peace of Mind
With the rising number of scams in the digital world, the number of Tech Support Scam complaints reported to the Internet Crime Complaint Center (IC3), just between January 1, 2016 and April 30, 2016 reached 3,668.
A Tech Support Scam is when an attacker calls pretending to be a technical support person associated with a legitimate-sounding, but phony, third-party provider. These folks, called scammers, will try and convince you to give them remote access to your device using their social engineering skills. If the device is a phone or a tablet, the scammer will ask you to connect it to a desktop or a laptop. Once the scammer has remote control of your device, the scammer will claim to have found multiple viruses or scareware on the device and will tell you that it needs to be fixed immediately. The scammer will try and convince you to pay a fee with a personal check, debit/credit card or wire transfer the payment. Continue reading Tech Support Scams: A deceptive way to con people
During the 2012 LinkedIn data breach, about 6.5 million user account passwords were said to have been compromised, but the recent revelation of 117 million account passwords being compromised has sent a new wave of concern amongst LinkedIn users. Continue reading IDs for “Sale”: Is your LinkedIn account safe?
A fresh wave of spear phishing has hit the markets with a newly themed scam called “Secure Doc”.
Spear phishing is considered to be the most specific type of phishing attack, as it’s directly targeted at an individual or an organization. This form of phishing has become one of the most prevalent phishing techniques and has seen an exponential rise with the highest success rates. Continue reading Secure Document Phishing Attacks
The news continues to be filled with cases of ransomware and data breaches. C-level executives ask regularly about their organizations’ security, as well as their compliance posture. Continue reading Office 365+
The Federal regulators from HIPAA have issued new guidelines for the healthcare organizations to augment their defenses for cyber security. The Department of Health and Human Services Office for Civil Rights (OCR) outlined steps to avoid falling victim to the rising threats. The guidance was issued to prevent the spread of malware, following several attacks that affected the health care industry, so much as to temporarily shut a 10-Hospital system network. Continue reading New guidance for preventing healthcare cyberattacks