Skip to content

Category: cybersecurity

Read the latest articles and news from the world of cybersecurity.

Technologies To Detect And Prevent Ransomware Attacks

Verizon’s Data Breach Investigations Report puts the cost of 95% of security incidents at $1 million – $2.25 million dollars. The report is based on the analysis of 16,312 security
Read More

Can you have a Ransomware attack if you are HIPAA-compliant?

The short answer: Yes   The in-depth answer: The Health Insurance Portability and Accountability Act (HIPAA) sets the minimum standards for protecting sensitive patient health information (PHI). The Department of Health
Read More

Sources of Ransomware Attacks on Healthcare Systems

A cohort study published in The Journal of the American Medical Association in December of 2022 revealed that Ransomware attacks targeting Healthcare delivery organizations more than doubled from 2016 to
Read More

Protect your DICOM from Cyber Attacks

DICOM stands for Digital Imaging and Communications in Medicine. It is a standard protocol for managing, storing, and transferring medical images and related data in a digital format. It ensures
Read More

Top 5 CMMC Implementation Gaps

CMMC is a security framework that is mandatory for contractors who want to work with the Department of Defense (DoD). It is based on the US National Institute of Standards
Read More

Security Tech Investments for Top 10 trends in 2023

How do you prevent cyberattacks from impacting your business operations? This is the big question organizations have been asking in the wake of growing cyberattacks across industries. A growing number
Read More

Anatomy of a Ransomware Attack and Lessons Learned

The average ransomware attack caused $1.85 million in losses to the company in 2021, up 41% from 2020. This estimate factors in  the amount paid, downtime, expense for IT technicians,
Read More

Comparing Top 5 Security Regulations for Healthcare

The healthcare industry has been the target of countless hacking attempts despite adopting security protocols outlined in the Health Insurance Portability and Accountability Act (HIPAA) since 1996. Hackers have found
Read More

Cybersecurity Best Practices

Keeping yourself protected from cybercrime isn’t just about having the latest security solutions. Good IT security practices, including regular training for employees, are essential components of every single security setup.
Read More

What is the difference between an Audit, Assessment and Certification?

Working on contracts for B2B, B2G, or B2C engagements can be daunting. The intense focus on proving the security and privacy of your systems is usually at the heart of
Read More