Why Physicians should never use public Wi-Fi

We all enjoy the convenience of being somewhere, like a coffee shop, airport, hotel room, or lobby of a building waiting, and hopping on the free Wi-Fi to catch up on some work. Unfortunately, all healthcare workers should avoid free Wi-Fi at all costs.  It is very important to realize that if you can access the free Wi-Fi, so can anyone else. They can even leave devices behind that stay on the Wi-Fi, breach other systems and transmit the data back to their "home" base.  If you share a local Wi-Fi net ...

The IoT, Little “Things” with Big Implications

You may have experienced the first coordinated cyber attack using “Internet of Things”, IoT. I bet you are wondering how did it affect me? How did it happen?  Did you notice on October 21st that Facebook and LinkedIn were not available?  Maybe you noticed that Amazon couldn’t take your order, and email was really slow? This was the result of a DDoS attack, Distributed Denial of Service, which have been going on for years, but this one was different. Typically, DDoS attacks are the result of ...

Focus on Security: Phishing for Malware

85 percent of organizations have suffered phishing attacks! That is straight from the Wombat 2016 State of the Phish report.  Is that depressing or what!  The sad thing is, phishing can be thwarted most of the time.  But, it requires diligent training of your ENTIRE staff.  Including the board members, owners, executives and doctors.  Everyone needs to be trained to identify phishing attacks and resist opening the link and/or attachment. A few stats from the report. 85% of organizations ...

Macro malware hidden in Office documents makes a comeback

Just when you thought it couldn't get any worse, the cyber-criminals pile on more threats. More reason to train your staff on cyber-security and get your cyber-security in order before it's too late. Repost from FierceITSecurity ... The year 2015 saw the resurgence of macro malware hidden in seemingly legitimate Microsoft Office documents. To trick recipients of emails with infected files, attackers use social engineering techniques, such as naming the file "invoice details" or "resume," related se ...

Coffee Makers and World Mayhem!

We’ve all heard or read about cyber breaches and viruses taking down clouds of computers or stealing millions of customer records.  But have you ever thought about a virus shutting off your coffee maker.  You might ask, “Why would a criminal want to turn off my coffee maker?”  Well, you’re not thinking like a criminal or an aggressive nation.  Instead of thinking about it on a personal basis, “Why did these scums crash my computer and cause me to lose all my data!”, think about the pandemoni ...