Strong Password Tips to Stay Secure

Having a strong password is a critical piece in making sure that your data stays protected online. As more people worked from home in 2020 due to the ongoing pandemic, cybercriminals were busy at their own work. Which means it is now more important than ever to have a strong password to protect yourself from cybercriminals who are using a plethora of ways to steal your data.

By |2024-09-16T11:30:43+00:00May 27, 2021|Cybersecurity|0 Comments

SECURITY ALERT! New Threat Attacks Routers and Network Storage Devices

A new threat which targets a range of routers and network-attached storage (NAS) devices is capable of knocking out infected devices by rendering them unusable. The malware, known as VPNFilter, is unlike most other Internet of Things (IoT) threats because it is capable of maintaining a persistent presence on an infected device, even after a reboot. VPNFilter has a range of capabilities including spying on traffic being routed through the device.

By |2024-09-16T11:43:46+00:00May 29, 2018|Cybersecurity|0 Comments

Congress Enacts CLOUD act through Omnibus Spending Bill

In the early morning hours of Friday March 23, the United States congress passed a $1.3 trillion dollar spending bill allowing the government to spend money through September 2018. The bill passed 65-32 in the senate, averting a potential government shutdown and funding the government through September 30. This omnibus bill (like many other historical omnibus bills) contains a lot of new legislation, and we're just starting to learn about some of the impacts of this new legislation now. Specifically, there are some provisions in this new bill that impact the way that we all use technology.

By |2024-09-16T11:44:08+00:00March 28, 2018|Cybersecurity|0 Comments

An Enterprise Action Plan to address Meltdown and Spectre

Undoubtedly, in recent days you’ve heard about the Meltdown and Spectre security vulnerabilities making headlines. If you’re unsure of what Meltdown and Spectre are – spend a few minutes searching the internet, and you’ll find plenty of excellent articles explaining what the vulnerability is. In short, Meltdown is a security flaw that could allow malicious hackers to bypass the hardware barrier between applications run by users and computer’s core processing memory, which is normally highly protected. Spectre is slightly different; it potentially allows hackers to trick otherwise error-free applications into give up secret information.

By |2024-09-16T11:47:16+00:00January 9, 2018|Cybersecurity|0 Comments

How to Identify Risks, Protect against Threats and Respond if Attacked: A New White Paper and Free Benchmarking Questionnaire from LeadingAge’s CAST

LeadingAge CAST has released a new white paper and free benchmarking questionnaire today that can be used in tandem to help providers identify risk, protect against threats, and respond if attacked. The paper and benchmarking questionnaire will help providers to think through concerns related to Health Insurance Portability and Accountability Act of 1996 (HIPAA) rules; analyze risks based on assessment and expert data on common threats; identify and implement best-practices and management techniques; develop a plan following a cybersecurity assessment; and understand, broadly, options and approaches to protect their data and technology infrastructure.  

Latest Security Breach may affect 400 Million Worldwide

After a year already filled with dozens of cybersecurity breaches, the largest could still be on the horizon. Kaspersky Lab’s antivirus software has been reportedly altered to help steal National Security Agency secrets for Russian government hackers. 

By |2024-09-16T11:58:02+00:00October 16, 2017|Cybersecurity|0 Comments
Go to Top