Security Insights
Explore insights and recommendations by security experts from the world of cybersecurity
Blogs
Transition to ISO 27001:2022
The ISO 27001:2022 certification standard was released in October 2022. It has replaced the ISO 27001:2013 edition via a three-year transition period, which ends on October 31, 2025. Companies with…
Cybersecurity Checklist for 2024
Cybersecurity is a critical concern for organizations in 2024 as the digital landscape continues to evolve and cyber threats become more sophisticated. Though organizations across industries have regulatory requirements related…
How to Prevent the Impact of Ransomware
Verizon’s Data Breach Investigations Report found that 74% of all breaches were a result of human error due to social engineering. This statistic is based on the analysis of 16,312…
Technologies To Detect And Prevent Ransomware Attacks
Verizon’s Data Breach Investigations Report puts the cost of 95% of security incidents at $1 million – $2.25 million dollars. The report is based on the analysis of 16,312 security…
Can you have a Ransomware attack if you are HIPAA-compliant?
The short answer: Yes The in-depth answer: The Health Insurance Portability and Accountability Act (HIPAA) sets the minimum standards for protecting sensitive patient health information (PHI). The Department of Health…
Sources of Ransomware Attacks on Healthcare Systems
A cohort study published in The Journal of the American Medical Association in December of 2022 revealed that Ransomware attacks targeting Healthcare delivery organizations more than doubled from 2016 to…
Protect your DICOM from Cyber Attacks
DICOM stands for Digital Imaging and Communications in Medicine. It is a standard protocol for managing, storing, and transferring medical images and related data in a digital format. It ensures…
What are the new controls added to ISO 27001 in 2022?
ISO 27001 is a globally respected information security standard. It is officially referred to as ‘ISO/IEC 27001’ and is part of the ISO/IEC 27000 family of standards for information security…
Top 5 CMMC Implementation Gaps
CMMC is a security framework that is mandatory for contractors who want to work with the Department of Defense (DoD). It is based on the US National Institute of Standards…












