Cyber security is always evolving and the days of installing a standard antivirus (AV) and being worry free are over. This article explores why a simple AV isn't enough to protect your information in today's threat environment.
The Gramm-Leach-Bliley Act (GLBA) has been around for years, but only had a real impact on colleges and universities for the last 3 to 4 years. Like any cybersecurity program, data security laws have a need to evolve and adapt to changing threats.
As more organizations have expanded their internet presence, web application attacks have become increasingly profitable for threat actors. Recent vulnerabilities such as Log4j have also brought more intense scrutiny to web applications.
Dean Dorton’s Cyber Security Team has observed an uptick in callback phishing attacks that impersonate PayPal, McAfee, CrowdStrike, and various other platforms. What can your business do to defend itself from this growing threat?
Phishing: a topic that conjures many emotions. Maybe that emotion is fear from an end user perspective, or maybe that emotion is frustration from a cyber-security professional. “Don’t click malicious links,” advice which has been parroted by security teams for years is sound. But, what if I told you all initial phishing links aren’t malicious?
The last major update to HIPAA came back in 2013, but all signs point to another update coming this year, in addition to, the minor changes and guidance previously established in February. Following is what to expect in 2022 from a data security, availability, and sharing perspective.
Phishing is one of the most prevalent and challenging cyber security threats. Business leaders should know what it is and how to spot it.
Becoming familiar with these examples of phishing will help you strengthen your cyber security approach to protect against them.
By understanding healthcare cyber security challenges, and putting mitigation efforts in place, providers can work to keep vital data safe.
Why is it advantageous for your business to get out in front of cyber threats? Here’s a look at the top 6 benefits of Cyber Security.