News broke recently that the Washington Redskins reported a laptop stolen that contained thousands of medical records for NFL players. The trainer who was responsible for the laptop claims that it did not contain any HIPAA protected data, but the impact remains largely the same.
Learn from this NFL team’s EMR fumble
Ransomware adopting self-replication
One of the biggest fears security experts have may be coming true: self-replicating ransomware. Viruses that have the ability to copy and spread themselves to new systems are nothing new, but until now ransomware attacks have been targeted campaigns.
OpenNotes portal initiative gaining steam
A recent initiative to give healthcare patients access to the notes their doctor or clinician writes about their visit is continuing its meteoric rise across the country. OpenNotes began a few years ago by researching the benefits of allowing patients to have access to their doctor’s notes.
New security flaw in popular image uploader
As more and more content management services are released to aid SMBs in online marketing, security risks also increase. One such helper is the image processing service ImageMagick. And while it has proven useful to countless businesses, it is now something you should be concerned about from a security standpoint.
Different types of hackers defined
Why do hackers attack? Is it for money, notoriety, or political reasons? Many business owners never ask these questions, and instead only think about the means of how a cyber attack takes place. But knowing the motive behind a hacker’s attack can help you understand whether or not you’re a target and what data you need to protect.
Ransomware alert for healthcare practices
Ransomware is becoming a growing problem for the healthcare industry. And with around a dozen attacks on hospitals being reported since the beginning of the year, you may be wondering just how severe the problem is. Should you be alarmed? How can you protect your practice? Here’s an inside look at how the ransomware epidemic is affecting the US and Canadian healthcare systems.
New email security feature for Office 365
No matter how much technology advances, human error has always been a fact of life. Nowhere is this more pertinent than when it comes to email security as many of today’s breaches start in an employee’s inbox. But now Microsoft is looking to change this.
Monitoring employees online. Is it right?
When it comes to monitoring your employees online, there are potential positives and negatives for your company. But as a business owner who’s never done it before, you may be clueless as to what these are. So to help, we’ve come up with a list of the pros and cons of employee monitoring.
How to switch securely to Office 365
The decision to migrate from an on-site SharePoint system to a cloud-based Office 365 solution isn’t one that most small or medium-sized businesses take lightly. In fact, though the popularity of Office 365 and other cloud-hosted platforms continues to soar, plenty of companies still have legacy SharePoint systems in place for at least part of their operations.
Cyber threats and the finance sector
TTP’s stands for threats and tactics, techniques and procedures, the number of which has been gradually increasing since 2015. The financial services sector has long been the target for cyber criminals, where they apply a myriad of techniques ranging from social-engineering to credential-stealing malware.