Cybersecurity

digital floating password icons

2 min read

Password crisis: 19 billion leaked in under a year

What happened Cybernews has revealed that over 19 billion passwords have been exposed through more than 200 data breaches since April 2024. The...

Read More
cisa logo

2 min read

Hackers targeting oil and gas systems, CISA warns

What happened The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a warning to infrastructure organizations, alerting them to...

Read More
medical provider holding smartphone

5 min read

How providers use mobile email on the go

The adoption of mobile devices in healthcare settings has surged dramatically over the past decade. A 2021 study found that 99% of surveyed doctors...

Read More
red server

2 min read

Co-op shuts down IT systems to contain cyberattack

Co-op has shut down parts of its IT infrastructure to contain a cyberattack, marking the second major UK retail breach in two weeks amid escalating...

Read More
Image of someone typing.

4 min read

How legacy devices create backdoors into healthcare systems

Legacy devices create systematic backdoors through four primary vulnerabilities namely unpatched software, network exposure, default configurations,...

Read More
lock on keyboard with red screen reading ransomware

1 min read

Columbia Eye Clinic begins investigating likely ransomware attack

The South Carolina-based eye care center recently published a notice informing customers of a possible breach.

Read More
Image of someone using an authentication app.

4 min read

What are MFA bypass kits?

MFA bypass kits are tools or techniques designed to bypass Multi-Factor Authentication security measures. These kits exploit vulnerabilities in...

Read More
Image of a hand stopping falling blocks.

5 min read

The building blocks of risk management in healthcare facilities

The building blocks of risk management in healthcare facilities form a structured, cyclical process centered on proactive mitigation and...

Read More
Image of a man with a hoody on a laptop.

5 min read

What is an enumeration attack?

An enumeration attack is a method used by hackers to confirm and verify records stored on a web server using brute-force techniques. These attacks...

Read More
Image of cogs in a machine.

6 min read

Machine learning-based intrusion detection systems

The healthcare industry is facing an unprecedented surge in cyber threats, with sensitive patient data becoming an increasingly valuable target for...

Read More
Image of someone handing cash to someone else.

5 min read

What is diversion theft?

Diversion theft is a social engineering tactic that tricks individuals or businesses into redirecting valuable goods or information to an unintended...

Read More
Image of dental tools.

4 min read

How to respond to a data breach in a dental prcatice

In dental practices, a data breach typically involves the compromise of patient information, such as personal details, medical records, or financial...

Read More
Image of file folders in a cabinet.

2 min read

What are data classifications?

While HIPAA does not require specific data classification levels, organizations often adopt a simple three level classification system. These can...

Read More