Suspicious Top-Level Domains: What You Should Know

What is a Domain? Domain names are identification strings that define a realm of administrative autonomy, authority, or control within the Internet — they either represent an Internet Protocol (IP) resource (i.e. a personal computer accessing the Internet), a server hosting a website, the website itself, or other services that communicate through the Internet. Domain […]

HIPAA Security Rule Part 2: General Data Security Rules for Electronic Protected Health Information

In part 1 of the HIPAA Security Rule blog series, we introduced you to healthcare data security basics, or in other words, what the HIPAA Security Rule is, what the primary objectives are, and what kind of information is protected by the HIPAA Security Rule. Below, and as part 2 of this series, we are […]

How to Protect Healthcare Data from Orangeworm

Orangeworm, the new cyber group, seems to have its eyes set on undermining healthcare data security. Just last month, Symantec reported that they believe Orangeworm is using malware Trojan.Kwampirs to target: Healthcare Providers Pharmaceutical Firms IT Solution Providers for Healthcare Healthcare Equipment Manufacturers Manufacturing, IT, Agriculture, and Logistics Firms Possibly Linked to Healthcare Symantec believes […]

Orangeworm Targeting Healthcare Data Security with Trojan.Kwampirs

Symantec released a late April 2018 report stating Orangeworm, a new cyber group, has been undermining healthcare data security with targeted attack campaigns against large healthcare firms and related industries using a custom backdoor malware known as Trojan.Kwampirs. Here’s what you need to know to stay on top of the developing IT health and security […]

What is Malware? Malware 101

Malware is a shorthand and umbrella term that describes all malicious software — or any software program that intentionally acts against the requirements of the computer user. Because of its umbrella-like designation, malware also refers to pretty much any form of hostile or intrusive software, including: computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, […]

Detecting a Computer Virus

At least 16 million U.S. households have suffered a computer virus in the last two years. In spite of the proliferation of antivirus software, families and businesses alike suffer from viruses, worms, phishing, password stealing attacks and more. It is estimated that computer viruses, spyware and phishing have cost U.S. households $4.55 billion dollars.[1] While […]

Security: Are Software Companies to Blame?

A former hacker spoke out in New York Times recently setting his sites on large software companies. “The unspoken truth is that for the most part, large software companies are not motivated to make software secure,” writes Marc Maiffret. He claims that many software companies prioritize developing more features and functions instead of focusing improving […]

Data Breaches: 20 Critical Security Controls

The Verizon Data Breach Investigations Report makes it clear that each organization needs to implement a multi-faceted security solution to address the range of potential threats. Verizon points out that a one-size-fits-all security package is not a solution. Each organization has unique challenges based on type and size of company, processes and procedures, budget, and other […]