Digital Fingerprints: What You Need to Know

Whether you know it or not, you’ve left your impact on the Web. Every day, computers are becoming more and more skilled at detecting the difference between legitimate and illegitimate users, and it all relies on a digital fingerprint—a form of data that organizations use to identify fraudulent behavior. But as these systems evolve, so […]

Health IT Vendor Faces $145 Million Settlement

If you’re reading this, hopefully you can say that your organization is compliant with HIPAA, the national standards set in place to protect medical records and personal health information. If you’ve taken sufficient steps to prevent fraud and abuse in Medicare, you should be adhering to the Anti-Kickback Statute, and no initiative to implement electronic […]

Addressing Federal Cybersecurity Shortcomings

Nowadays, the biggest stories about cybersecurity breaches tend to concern major companies like Facebook, Marriott, and Capital One. But what you may not realize is that now more than ever, government agencies are a popular target for crippling cyber attacks. According to the U.S. Conference of Mayors, more than 170 government systems have suffered the […]

Educating the Future of Cybersecurity

As cyber attackers evolve with the times, so too will those who fight back—and as one summer camp knows, it all starts with the next generation. This year, with money from a recently awarded National Science Foundation and National Security Agency grant, Harford Community College in Maryland launched its GenCyber Smart Camp for middle schoolers. […]

The Latest and Strangest Security Risk

Last week, we discussed endpoint protection for mobile devices, and how cybersecurity threats tend to crop up in the most unexpected places. Now, based on an August report, we know that you may be overlooking another mundane but crucial vulnerability in your organization: the office printer. A Saturday panel at DEF CON, the hacking convention […]

Securing Mobility in Medicine

The healthcare industry is taking on mobility to modernize for the digital age, but with this step forward comes a host of vulnerabilities and threat vectors determined to set you several steps back. Providers with a plan to evolve their mobile strategy need to be prepared to address the cybersecurity risks that come with it. […]

Teams Face Off in Cybersecurity Simulation

Cyber attacks tend to target the places you least expect. But cybersecurity professionals across the country are dedicated to preparing for any and all points of vulnerability, as evidenced by the latest version of the annual weeklong test “Cyber Flag.” As a tactical exercise series for U.S. Cyber Command, Cyber Flag simulates a conflict between […]

Ransomware as a Service

If you’re familiar with cyber attacks, you’re probably familiar with ransomware, a form of malware designed to deny access to a computer system and encrypt sensitive data until a “ransom” is paid. Ransomware has its origins in the early stages of the cyber world, and over time, its effects have only gotten more vicious. But […]

A Statewide Cybersecurity Emergency

School systems in Louisiana are under siege—and the culprit is in the coding. In the last three weeks, three North Louisiana school districts have found themselves impacted by a malware virus that shut down computer systems and breached district servers. In response, Louisiana Governor John Bel Edwards has issued a state of emergency, and the […]

Facebook Takes On $5 Billion Fine

In the historic conclusion to a series of allegations involving Facebook’s privacy policies, the Federal Trade Commission announced a $5 billion settlement with the social media giant on July 24. But despite the record-breaking fine and an initiative to increase privacy oversight, the deal does not hold anyone at Facebook accountable—including CEO Mark Zuckerberg—and only […]