The Next Stage For Cyber Education

Navigating a world made remote by COVID-19 has brought all sorts of new challenges to light—but amid struggles to adapt and socially distance, there are those determined to make the best of it. Jonathan Slater and Lorna Armitage, industry professionals in the U.K., are taking the opportunity to give homeschooled kids a crash course in […]

Staying Secure With Telemedicine

Practicing safe social distancing? Got a health concern that can’t wait? Telemedicine is on the rise, and with complications abound due to COVID-19, the remote health consultation trend has skyrocketed in popularity. To limit in-person interactions with medical staff and stem the risk of exposure, hospitals, clinics, and other specialized health offices have begun offering […]

VPNs: Know The Risks

If you’ve ever worked from home—aptly coined “telecommuting”—chances are you’ve used a VPN, or Virtual Private Network, to connect with your workplace server. VPNs are designed to extend a private network over a public network, making it easy for telecommuters to send and receive data from their home computer without compromising their company server. Now, […]

COVID Cyberattacks Surge

Why might a global pandemic cause an uptick in cyberattacks? The question has more answers than you’d think. Worldwide disruptions are ideal conditions for cyberattackers to operate in, particularly when they cause repercussions across healthcare, economic, social, and political structures. Entire communities have made the move to digital spaces to promote social distancing and protect […]

Communication in the Age of COVID-19

As companies transition to uphold social distancing and protect the health and safety of their employees, it may feel difficult to keep lines of communication open and effective. Public health is an ever-evolving condition, and as in all other aspects of cybersecurity, a dynamic situation calls for a dynamic response. This week, we offer tips […]

The Key to Site Legitimacy

You see them every day, even if you don’t pay them any mind. The little padlock symbol in the corner of your address bar can be found on almost every website you visit. Along with the Hypertext Transfer Protocol Secure, or HTTPS, the padlock shows users that a site has secure credentials. It serves as […]

A Generational Look at Cybersecurity

As the world of cybersecurity expands, so too does its workforce, and an increasingly large number of professionals in the field belong to a generation that grew up with technology. But what does that mean for industry-wide practices? A recent study by NTT Ltd., a global technology and services provider, has discovered that professionals over […]

Rural Hospital Responds to Ransomware

Having a backup plan doesn’t just keep you up to code; it also ensures that you can continue providing the service your clients have come to expect. A few weeks ago, we examined the attack on Premier Family Medical and what they did to ensure they were able to continue operating as usual. Today, we […]

Phishing Attack Causes Major Breach

However advanced cybercriminal tactics become, there will always be those who prefer to play it old-school—and sometimes the oldest, most reliable strategies are the ones you’re least prepared for. A recent attack on a health plan organization consisted of two phishing incidents, affecting two different subsidiaries of managed care company Magellan Health. Earlier this year, […]

Auctioning Off Admin Access

In past articles, we’ve investigated in-depth the threat of the cybercriminal economy: stolen data sold and traded on the so-called “dark web,” along with increasingly malicious forms of software (like Ransomware-as-a-Service) distributed with step-by-step instructions for ill-intentioned hackers. Our increasingly digital economy has, in turn, paralleled a growth spurt in these dark web transactions. And […]