Cyber-Security

Home » Cyber-Security

Medical Identity Theft – When Your Health Is Their Wealth

By |2020-08-09T18:27:16+00:00August 9th, 2020|Cyber-Security|

Cybercriminals are giving a new meaning to the term ‘Health is Wealth’. Medical identity theft has victimized over 2.2 million people and that number is growing. Although medical identity theft is not something new, the increasing number of data breaches has increased the number of victims. What is Medical Identity Theft? Medical identity theft occurs when someone steals your personal information to get free medical care, medical devices or prescription drugs under your name. This is more dangerous than identity theft because medical identity theft not only ruins your finances, it can have terrible effects on your health. The information

Comments Off on Medical Identity Theft – When Your Health Is Their Wealth

4 signs your healthcare organization is due for a network upgrade

By |2020-08-09T18:10:26+00:00August 9th, 2020|Cyber-Security|

Your competitors are ready to invest in modern IT infrastructure, so now is the right time to start lobbying your higher-ups for a network upgrade. The proof? According to Damon Consulting’s third annual Healthcare IT Demand Survey, infrastructure upgrades have ranked with AI and big data analytics as top spending priorities in recent years. So what does this mean for IT leaders? It translates to a strong business case for any network upgrade you might have on your own wishlist. If you’re still not convinced, here are four signs that you need to catch up with digitizing healthcare and leave behind

Comments Off on 4 signs your healthcare organization is due for a network upgrade

7 Coronavirus related scams targeting your business

By |2020-06-11T13:37:38+00:00May 11th, 2020|Cyber-Security, Safety and Cyber Security|

We’ve warned consumers about Coronavirus related scams, but businesses are at risk, too. Keep your guard up against these seven B2B scams that try to exploit companies’ concerns about COVID-19. In addition to sharing this information with your employees and social networks, read on for how you can report Coronavirus scams to the FTC. Coronavirus related scams: "Public Health" Scams Fraudsters are sending messages that claim to be from the Centers for Disease Control and Prevention (CDC), World Health Organization (WHO), or other public health offices. They may ask for Social Security numbers, tax IDs, etc. Other variations direct you to

Comments Off on 7 Coronavirus related scams targeting your business

5 File Sharing Best Practices to Protect Business Data at Home

By |2020-06-11T13:45:38+00:00April 29th, 2020|Cyber-Security, Data Compliance|

After several weeks of lockdown with its necessary work-from-home (WFH) conditions, we’ve all adapted fairly well to the WFH basics. We can access our company network and apps, post to the blog and gratefully check the status of our paychecks. Perhaps now is the time to check and improve the security of our business data by implementing some file sharing best practices. 1. Establish a Security-first Mindset With COVID-19 WFH policies, end users regularly conduct business via home computer, laptop or mobile device. As a result, the network perimeter has largely disappeared. Thus, an organization’s WFH security posture would be

Comments Off on 5 File Sharing Best Practices to Protect Business Data at Home

COVID-19 Phishing SCAMS: 5 ways to Protect Your Business

By |2020-06-11T13:49:00+00:00April 23rd, 2020|Cyber-Security, Safety and Cyber Security|

Since the COVID-19 pandemic began, cybercrime has increased by up to 300%. According to cyber security experts, a big part of that increase has come in the form of COVID-19 phishing scams. Now more than ever, organizations must remain hyper-vigilant to protect assets and employees from attack. With many employees working from home (WFH), everyone appears to be a target. With expanded security perimeters, reports of phishing attacks are way up, even within our own organization. Current COVID-19 Phishing Scams The most common COVID-19 phishing scams involve the sinister but effective method of spoofing authoritative sources. Often-spoofed organizations include the

Comments Off on COVID-19 Phishing SCAMS: 5 ways to Protect Your Business

4 Data Governance Tools that Protect and Power Vital Information Assets

By |2020-06-12T10:30:08+00:00April 1st, 2020|Cyber-Security, Data Compliance, Information Governance and Management|

Along with daffodils and Mardi Gras, spring 2020 brought a pandemic that has rocked the global economy and changed daily life. As organizations navigate the crisis, they depend on accurate, accessible and usable data to forecast the future and inform decisions. Data governance tools play an essential role in ensuring that businesses realize the full potential of data. For example, retail businesses need to respond in an agile way to changes in consumer buying habits. With up-to-date data, they can quickly analyze, and even anticipate, those changes. And with more employees working remotely, data governance tools help ensure that the

Comments Off on 4 Data Governance Tools that Protect and Power Vital Information Assets

Coronavirus Phishing Attacks Target Remote Workers

By |2020-06-12T10:32:00+00:00March 24th, 2020|Cyber-Security, Safety and Cyber Security|

Spurred by social distancing orders, the American workforce is returning home. In fact, Netskope Threat Labs reports that 58 percent of users worked remotely last week. This compares with an average of 27 percent prior to the pandemic. Unfortunately, researchers have also recorded a corresponding spike in coronavirus phishing attacks. Cyber criminals love a crisis, from terror attacks to natural disasters. Using emotional appeals and a sense of urgency, they trick users into surrendering sensitive information or unknowingly downloading malware. And most of the time, they use email to launch the attack. Remote Work Raises the Risk While advances in

Comments Off on Coronavirus Phishing Attacks Target Remote Workers

Advancements in Data Encryption Up the Data Defense Game

By |2020-06-12T10:44:38+00:00March 5th, 2020|Cyber-Security, Data Compliance, Technology|

From credit card transactions to online loan applications and sensitive emails, billions of pieces of valuable information cross the internet every hour. Keeping that data safe from unauthorized access requires increasingly sophisticated tools. As the challenges to data security grow more intense, advancements in data encryption rise to meet them. In the movies, messengers transmitted important documents in a briefcase, handcuffed to the messenger’s wrist and accessible only via a key. The messenger made certain that no one tampered with the document during transit and that only the intended recipient opened the briefcase to retrieve and read its contents. Encryption

Comments Off on Advancements in Data Encryption Up the Data Defense Game

Control Mobile Data: Information Governance Essential

By |2020-06-15T11:18:58+00:00January 22nd, 2020|Cyber-Security, Information Governance and Management|

Information governance to control mobile data and reduce the associated costs of eDiscovery becomes essential. One of the biggest and costliest issues facing organizations under legal litigation is the ability to accurately provide electronic records as evidence when requested by the courts in eDiscovery. Organizations either have no idea what email or electronic document data exists in their systems and employee devices or where that data may reside. The Challenge of Mobile Data In today’s global communications environment, electronic messages can circumnavigate the globe in seconds. Messages can exist on cellular telephones, PDA’s, laptops, home computers and backup tapes. And

Comments Off on Control Mobile Data: Information Governance Essential

Healthcare Cyber Security Best Practices to Protect Patient Data in 2020

By |2020-05-22T04:50:59+00:00January 3rd, 2020|Cyber-Security|

In recent years, hackers have turned their attention to healthcare organizations. Not only do hospitals store valuable personal data, but they often underspend on cyber security. This makes them highly attractive targets. Investing in solid healthcare cyber-security protects essential data and ensures regulatory compliance. More importantly, it can quite literally save lives. Late last year, East Ohio Regional Hospital discovered a ransomware attack. Thanks to multi-layer defense systems and reliable backups, the hospital managed to recover with minimal damage. Other hospitals around the country have not proven so lucky. From disruption of services to exposure and loss of critical patient

Comments Off on Healthcare Cyber Security Best Practices to Protect Patient Data in 2020
Go to Top