Professionals in the technology and security industry are dealing with a new nightmare virus infecting systems across the world: Invisible Malware. Hackers are evolving and invisible malware is the new method of attack on data systems and servers. While traditional firewalls and anti-virus solutions are powerless against this new breed of virus, there are steps […]
Suspicious Top-Level Domains: What You Should Know
What is a Domain? Domain names are identification strings that define a realm of administrative autonomy, authority, or control within the Internet — they either represent an Internet Protocol (IP) resource (i.e. a personal computer accessing the Internet), a server hosting a website, the website itself, or other services that communicate through the Internet. Domain […]
HIPAA Security Rule Part 2: General Data Security Rules for Electronic Protected Health Information
In part 1 of the HIPAA Security Rule blog series, we introduced you to healthcare data security basics, or in other words, what the HIPAA Security Rule is, what the primary objectives are, and what kind of information is protected by the HIPAA Security Rule. Below, and as part 2 of this series, we are […]
How to Protect Healthcare Data from Orangeworm
Orangeworm, the new cyber group, seems to have its eyes set on undermining healthcare data security. Just last month, Symantec reported that they believe Orangeworm is using malware Trojan.Kwampirs to target: Healthcare Providers Pharmaceutical Firms IT Solution Providers for Healthcare Healthcare Equipment Manufacturers Manufacturing, IT, Agriculture, and Logistics Firms Possibly Linked to Healthcare Symantec believes […]
Orangeworm Targeting Healthcare Data Security with Trojan.Kwampirs
Symantec released a late April 2018 report stating Orangeworm, a new cyber group, has been undermining healthcare data security with targeted attack campaigns against large healthcare firms and related industries using a custom backdoor malware known as Trojan.Kwampirs. Here’s what you need to know to stay on top of the developing IT health and security […]
Cybersecurity in the Financial Sector: Email Threats
Cyberattacks have come to plague our society as they have become increasingly sophisticated and more prevalent over the past several years. While all industries have faced a heightened risk of cyberattack recently, the financial sector has been the hardest hit. Between 2013 and 2015, data breaches in financial companies have more than doubled. High profile […]
What is Malware? Malware 101
Malware is a shorthand and umbrella term that describes all malicious software — or any software program that intentionally acts against the requirements of the computer user. Because of its umbrella-like designation, malware also refers to pretty much any form of hostile or intrusive software, including: computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, […]
Detecting a Computer Virus
At least 16 million U.S. households have suffered a computer virus in the last two years. In spite of the proliferation of antivirus software, families and businesses alike suffer from viruses, worms, phishing, password stealing attacks and more. It is estimated that computer viruses, spyware and phishing have cost U.S. households $4.55 billion dollars.[1] While […]
Security: Are Software Companies to Blame?
A former hacker spoke out in New York Times recently setting his sites on large software companies. “The unspoken truth is that for the most part, large software companies are not motivated to make software secure,” writes Marc Maiffret. He claims that many software companies prioritize developing more features and functions instead of focusing improving […]
Data Breaches: 20 Critical Security Controls
The Verizon Data Breach Investigations Report makes it clear that each organization needs to implement a multi-faceted security solution to address the range of potential threats. Verizon points out that a one-size-fits-all security package is not a solution. Each organization has unique challenges based on type and size of company, processes and procedures, budget, and other […]