Communication in the Age of COVID-19

As companies transition to uphold social distancing and protect the health and safety of their employees, it may feel difficult to keep lines of communication open and effective. Public health is an ever-evolving condition, and as in all other aspects of cybersecurity, a dynamic situation calls for a dynamic response. This week, we offer tips […]

The Key to Site Legitimacy

You see them every day, even if you don’t pay them any mind. The little padlock symbol in the corner of your address bar can be found on almost every website you visit. Along with the Hypertext Transfer Protocol Secure, or HTTPS, the padlock shows users that a site has secure credentials. It serves as […]

A Generational Look at Cybersecurity

As the world of cybersecurity expands, so too does its workforce, and an increasingly large number of professionals in the field belong to a generation that grew up with technology. But what does that mean for industry-wide practices? A recent study by NTT Ltd., a global technology and services provider, has discovered that professionals over […]

Rural Hospital Responds to Ransomware

Having a backup plan doesn’t just keep you up to code; it also ensures that you can continue providing the service your clients have come to expect. A few weeks ago, we examined the attack on Premier Family Medical and what they did to ensure they were able to continue operating as usual. Today, we […]

Phishing Attack Causes Major Breach

However advanced cybercriminal tactics become, there will always be those who prefer to play it old-school—and sometimes the oldest, most reliable strategies are the ones you’re least prepared for. A recent attack on a health plan organization consisted of two phishing incidents, affecting two different subsidiaries of managed care company Magellan Health. Earlier this year, […]

Auctioning Off Admin Access

In past articles, we’ve investigated in-depth the threat of the cybercriminal economy: stolen data sold and traded on the so-called “dark web,” along with increasingly malicious forms of software (like Ransomware-as-a-Service) distributed with step-by-step instructions for ill-intentioned hackers. Our increasingly digital economy has, in turn, paralleled a growth spurt in these dark web transactions. And […]

Digital Fingerprints: What You Need to Know

Whether you know it or not, you’ve left your impact on the Web. Every day, computers are becoming more and more skilled at detecting the difference between legitimate and illegitimate users, and it all relies on a digital fingerprint—a form of data that organizations use to identify fraudulent behavior. But as these systems evolve, so […]

Health IT Vendor Faces $145 Million Settlement

If you’re reading this, hopefully you can say that your organization is compliant with HIPAA, the national standards set in place to protect medical records and personal health information. If you’ve taken sufficient steps to prevent fraud and abuse in Medicare, you should be adhering to the Anti-Kickback Statute, and no initiative to implement electronic […]

Addressing Federal Cybersecurity Shortcomings

Nowadays, the biggest stories about cybersecurity breaches tend to concern major companies like Facebook, Marriott, and Capital One. But what you may not realize is that now more than ever, government agencies are a popular target for crippling cyber attacks. According to the U.S. Conference of Mayors, more than 170 government systems have suffered the […]

Educating the Future of Cybersecurity

As cyber attackers evolve with the times, so too will those who fight back—and as one summer camp knows, it all starts with the next generation. This year, with money from a recently awarded National Science Foundation and National Security Agency grant, Harford Community College in Maryland launched its GenCyber Smart Camp for middle schoolers. […]