Focus on Security: Phishing for Malware

85 percent of organizations have suffered phishing attacks! That is straight from the Wombat 2016 State of the Phish report.  Is that depressing or what!  The sad thing is, phishing can be thwarted most of the time.  But, it requires diligent training of your ENTIRE staff.  Including the board members, owners, executives and doctors.  Everyone needs to be trained to identify phishing attacks and resist opening the link and/or attachment. A few stats from the report. 85% of organizations ...

Focus on Security: Printer Security

We all know we need to improve our computer and network security.  But we often forget that printers are now smart and connected.  Basically, they're another computer on the network. Therefore, we all need to take notice and insure we improve security on our printers.  The exact steps will vary depending on the brand, size, complexity, connection type and features of each printer.  But, below are several steps you can take to get started. Network - secure it Make sure you have a strong password on ...

HHS Releases New Guidance on Ransomware

One of the top newsmakers of 2016 has been ransomware.  During the first half of this year, ransomware grew 300% to 4,000 daily attacks! But several high profile attacks of hospitals really put it in the spotlight.  Although it has been around for several decades, in the past 4 years, Russian groups have further developed its capabilities and propagated its use worldwide. The dark web or darknet also significantly contributed to the increase in ransomware attacks due to its black market for such products. ...

Focus on Security: Microsoft sets security bulletin record

Microsoft had 135 security bulletins in 2015, which was a significant increase over previous years.  In fact it was over 25%.  What this means to you?  That Microsoft had to fix a lot of vulnerabilities in their software. Which meant someone found a way to break in to (breach) Microsoft Windows or Office or other Microsoft software.  What should you do? Make sure you have Microsoft updates turned on and all of your servers and workstations are up-to-date on software patches (updates). This includ ...

HIPAA Crossword Puzzle

HIPAA Crossword Puzzle Third Rock We thought it might be good to have you learn more about HIPAA through a challenging crossword puzzle. We hope you enjoy completing the puzzle and learn a little about HIPAA in the process.  You can click the image below to download the PDF version and print it off. Answers Across: 2. PHI 3. backups 5. ice cream 6. HIPAA 8. risk assessment 10. covered entities 12. disaster recovery 15. PII 17. cyber breach 20. cyber security 21. audit 22. lemonade ...

Insider Breaches – A Risk that Shouldn’t be Overlooked

With all the headlines on cyber breaches and the cyber criminals trying to break into your digital environment, you may overlook a common and very real threat.  Accenture's recent security report said 69% of the people surveyed had experienced an insider attempt or success at data theft or corruption.  Many of the other cyber reports show the same types of stats.  It is reasonable to anticipate someone inside your organization may be planning or is actively stealing your company’s proprietary infor ...

Using Caution with Email Attachments

Email is a way of life in most business and is often one of those tools we take for granted. We all feel the pain when it is down as for many it is a key part of their job. It's also an extremely powerful tool that allows us to not only send and receive messages and meeting request, but also attachments. This is where email becomes dangerous to both you and your organization. Most organizations take some level of effort to protect the computer and network from these potentially dangerous attachments wit ...

Cyber-breaches: Don’t Lie to Yourself

We've heard many arguments for not addressing your HIPAA compliance by healthcare covered entities. Honestly, it's appalling to think a person that provides care to people doesn't care about protecting that person's personal information to prevent their customer from experiencing emotional and financial suffering and potential ruin.  The first issue for the healthcare covered entity is to understand it's not about the HIPAA audit but about being breached, losing ePHI and then being forced to be audit ...

The Big Boys’ 2016 Cyber Security Reports

The "big boys" in cyber security have released their annual Cyber-Security reports, ugh or UGH.  Cyber security is so important now that some companies have jumped into the mix of providing a report.  AT&T released their first cyber-security report this year. Forbes has a great article by Steve Morgan, outlining all of the reports and providing links to download all of them.  I'll try to sum them all up in a short list here.  But, check Mr. Morgan's article out for more in-depth summaries and links ...

Your iPhone Is a Target for Criminals

Check Point Software released their April 2016 Threat Index revealing what we all know; cyber-threats are rising at alarming rates.  The report shows Apple's iOS devices are under heavier attack than reported in previous reports. Over 2,000 unique malware families were identified by Check Point during April, which they state is a 50 percent increase over March, and you thought rabbits multiplied rapidly!  The iOS issue comes from the fact they found XcodGhost had moved into the top three most common mobi ...

1 2 3 4 5 6