Email Security for HIPAA Compliance

Justice mallet and HIPAA acronym close up. Health insurance portability and accountability act

Email Security for HIPAA Compliance The Health Insurance Portability and Accountability Act (HIPAA) sets the standards for protecting sensitive electronic Protected Health Information (ePHI). All healthcare organizations (also known as covered entities) and their business associates must comply with HIPAA. The HIPAA Privacy Rule allows healthcare providers to communicate with patients via email, provided they… Continue reading Email Security for HIPAA Compliance

Phishing Prevention for Universities

Beware of Phishing Scam Emails - Concept credit card on a fishing hook on computer keyboard

Phishing Prevention for Universities Technology is at the core of nearly everything we do these days. Computers, laptops, IoT devices, you name it! We are surrounded by technology, and the growth won’t slow down in the foreseeable future. Unfortunately, problems come with all the benefits we gain from technological advances. Undoubtedly, one of the most… Continue reading Phishing Prevention for Universities

Medical Device Security

Medical Insurance

The first known ransomware attack that affected networked medical devices occurred in May 2017. At this time, the global ransomware attack WannaCry affected radiological devices in some hospitals. Cancer patients undergoing radiation treatment at four healthcare facilities had to reschedule appointments after a software outage caused by a cyberattack on their third-party vendor’s oncology cloud… Continue reading Medical Device Security

Incident Response for Universities and Colleges

Cyber crime, cyber attack, hacking, computer desktop

Incident Response for Universities and Colleges The ultimate aim of the incident response team for colleges and universities is to promote and uphold an environment that ensures confidentiality and integrity for the students while concurrently enhancing the availability of the data and the university’s systems to its stakeholders. The universities handle volumes of data of… Continue reading Incident Response for Universities and Colleges

Cybersecurity Tips for Higher Education

Afro girl using laptop and books for education

Cybersecurity Tips for Higher Education In a 2020 poll of 154 educational institutions, 40% of respondents said that cybersecurity has become much more important since the pandemic and the shift to remote learning. In a May 2021 article, Brian Kelly, the Director of the Cybersecurity Program at EDUCAUSE, references this poll as he gives a… Continue reading Cybersecurity Tips for Higher Education

Remote Work Cyber Attacks Are on the Rise

Businessman working remotely from a cafe

Letting employees remotely access the company’s details may lead to cybersecurity risks and potentially damage the business. Prior to the pandemic, people mostly worked in an office where the IT Security team was responsible for a hub-and-spoke model. It meant video meetings, emails, document management, and instant messaging were directed through a single security point… Continue reading Remote Work Cyber Attacks Are on the Rise

Recent Rise of Ransomware Attacks: What Are the Main Drivers?

cyber security Already Nomonated💚💜❤️

Ransomware is not a new phenomenon. The earliest recorded incident goes as far back as the 1980s. However, today’s ransomware operates at a scale and sophistication that makes it virtually unrecognizable from its early predecessors.    Each year, ransomware attacks are hitting a new high. In its annual Internet Crime Report, the FBI received almost… Continue reading Recent Rise of Ransomware Attacks: What Are the Main Drivers?

​​The Threat of Amazon Kindle Malware Ebooks

cropped view of woman reading ebook at home

In 2020, the Internet of Things (IoT) achieved a new, unprecedented milestone. During the year, there were more IoT connections, such as smart cars, devices, and factories, than non-IoT devices like smartphones, laptops, or computers. The coming years will be even better for IoT. By 2025, there could be almost 31 billion connected IoT devices compared… Continue reading ​​The Threat of Amazon Kindle Malware Ebooks

Pegasus Spyware: What You Need to Know

Bearded cyber terrorist gets access while typing a virus

Pegasus spyware recently came to the international limelight in mid-July 2021 when a coalition of 17 news organizations including The Washington Post, Le Monde, and The Guardian started reporting on a major investigation around it.  Dubbed the Pegasus Project, the investigation was led by Paris-based non-profit Forbidden Stories, an organization of reporters that deep-dives into… Continue reading Pegasus Spyware: What You Need to Know

How To Find The Best MSSP For Your Business

Staff meeting.

The current company cybersecurity landscape has altered considerably in the last five to 10 years. Business executives are focused on preventing their firms from becoming one of the businesses targeted by hackers as cyber threats get more sophisticated every day. In 2021, the worldwide cost of cybercrime is expected to reach an all-time high of… Continue reading How To Find The Best MSSP For Your Business