Social Engineering is a tactic used by cyber criminals to manipulate individuals to gain confidential information such as social security number, credit card number, passwords, etc.
In the cyber security world, the weakest link in the security chain are the users, which is why people are the target when it comes to social engineering. It doesn’t matter how many security measures you have in place. You can have locks on your doors, an alarm system, the latest firewalls, and network or security monitoring tools; all it takes to hack into your network is to trick a user into clicking on a malicious link they think came from a social media site.Read More
The phrase “tech support” has many connotations attached to it.Read More
Did you know that a security vulnerability in your fax machine could allow an attacker to bypass your firewall and access your confidential network resources? Fax machines use 1980’s technology and are relied upon heavily in the healthcare industry to help transmit patient information between providers. We often don’t give them a second thought after plugging them in, but they can represent a real risk to your organization’s data.Read More
For much of the past decade, the biggest security mistakes have boiled down to fumbling some basic tech security practices.Read More
You may have been thinking recently that your company needs to implement security awareness training. Maybe you’ve experienced a scare where a few employees have accidentally clicked on a phishing link in their Facebook inbox. You decide that behavior is risky for the person, but also for the organization.Read More
When a new hire comes aboard, all great businesses have this in common: comprehensive training. It's the mark of a great business because it shows the attention and care that goes into equipping employees with the tools they need to succeed at the company.Read More
Cybersecurity for medical practices is serious business. Granted, every business needs to take cybersecurity seriously. Cybercrime has been on the rise for a while and shows no signs of slowing down. For hospitals and other medical facilities, that's a terrifying reality. Healthcare organizations are subject to HIPAA and are tasked with keeping ultra private information secure. They're prime targets for cybercriminals looking to leverage the sensitive nature of the data against organizations. If you're a part of or you lead a medical practice, you need to keep cybersecurity in mind. Ask yourself the six questions below to help you vet your current cybersecurity solution:Read More