An overview of the top security concerns and what can be done to address them reveals that education and expertise are the two best ways of protecting the data in EHRs.
In this article we will outline some of the unique issues that law firms have regarding cyber security risks, as well as outline a four-step plan designed to help reduce a firm's chance of experiencing a serious cyber security incident.
Credential stuffing is another means that cyber criminals can use to access your accounts.
We’re pretty outspoken in our support of VPNs (virtual private networks) as an indispensable tool for your online security. However, considering that there are things that a VPN can and can’t do, we thought it would be helpful to specify what a VPN is really for.
Today we take a look at security theater and how cybersecurity solutions can sometimes go wrong.
While businesses and consumers alike have been concerned about staying healthy and the impact of quarantines and lockdowns on daily life in the wake of the novel coronavirus infection, COVID-19, that has been named a global pandemic, malicious coders have found a way to use those worries to their advantage.
The CISA has, as of January 2020, released an emergency directive that focuses on some critical vulnerabilities affecting all Windows systems, Windows CryptoAPI, Windows Remote Desktop Gateway (RD Gateway), and Windows Remote Desktop Client.
CISA, the Cyber Security and Infrastructure Security Agency, has issued a warning to Pulse Secure customers urging them to patch the 2019 Pulse Secure VPN vulnerability, CVE-2019-11510. The vulnerability is being exploited in real world attacks. In this post, we will outline the type of vulnerabilities discovered in these products, and why these issues leave a company particularly vulnerable.