The search found 4155 results.
Blog
Nearly six months after the Texas mass ransomware attacks that took down operations at 22 small Texas cities, we still talk about it pretty regularly. That's the type of impact a mass ransomware attack can have.
Blog
We’ve made it through one full month of the New Year and the outlook for terrorism-related cyber incidents is already pretty stormy. During the standoff with Iran, cyberattacks were listed as one of their top possible responses.
Blog
As a Managed Service Provider (MSP), there are many things you need to focus on to be successful in your business. You have to be a subject matter expert in your particular area in order to convince companies to outsource that function to you, customer service is always important, and response time and time to resolution are critical metrics that organizations will evaluate when deciding whether or not to continue your service.
Blog
If you’re in a regulated industry or serve customers that are, sooner or later you will probably have auditors examine your cybersecurity setup. This may be on the behalf of clients, or for your own internal corporate governance.
Blog
In May 2019, the American Medical Collection Agency (AMCA), a "business associate" of a number of healthcare providers, reported an eight-month data breach had exposed sensitive information for more than 20 million patients.
Blog
For any business accepting, processing, storing, or transmitting credit card information, PCI DSS compliance should be at the top of its must-do list. The Payment Card Industry Data Security Standard is a set of rules established to create a secure environment within all companies that accept credit card payments.
Blog
While it’s no surprise that nearly every major data breach of the last few years has involved the use of privileged credentials, it is surprising that one of the most effective security measures remains underutilized.
Blog
Normally, the only types of epidemics that healthcare organizations fight are the microbial kind. But lately, they have been hit with a rash of ransomware attacks, crippling their IT systems and demanding payments to unlock the encrypted system.
Blog
As data breaches within private organizations and government entities continue to rise, the expenses to recover from them are escalating at an exponential pace. With third-party breaches, there can be additional costs beyond the usual financial, regulatory, and reputational damage that an internally caused data breach can bring.
Blog
According to a report from Duo Security, 56% of healthcare companies across the U.S. are still operating on legacy operating systems and software. In case you’re not familiar with the term, legacy is just another word for outdated. In the world of cybersecurity, outdated usually means vulnerable to a cyberattack.