The tech industry is littered with buzzwords: overused jargon generally meant to inspire feelings of hope and accomplishment. Not all have positive connotations however, and data compliance is one of those spooky buzzwords that many small- and medium-sized businesses have scant specific knowledge about.
New heights in data compliance penalties
Hybrid clouds give flexibility to SMBs
Most people will tell you that clouds can be only be found in the sky. But in the IT world, clouds are more grounded: the latest of which are a combination of private clouds and public clouds, appropriately dubbed “hybrid clouds.” This innovation allows SMBs to have the best of both cloud worlds while minimizing IT expenses, optimizing scalability, and improving security.
WordPress 4.5.3 patches security vulnerabilities
WordPress is an amazing open source platform that is favored by individuals and business users worldwide due to its ease of use, simplicity and flexibility. However, given that it is the most widely used content management system, it is also the most vulnerable platform out there.
Microsoft Office 365 ravaged by ransomware
The Internet is a powerful platform that brings people together on a global level while giving them access to a wealth of information anytime they please. With the good, comes the bad - some utilize their skills in committing cyber crimes from the comfort of their own homes.
Game Over: NBA team losses valuable data
Good cyber security, much like the best NBA defenses, must be strong and able to stop threats from every which way. For the Milwaukee Bucks, their on-court and cyber security defense could both use a little practice. Yahoo! Sports reported that the Milwaukee Bucks sent out the names, addresses, Social Security numbers, compensation information and dates of birth of players as part of a spoofed email attack.
Learn from this NFL team’s EMR fumble
ESPN recently reported that a laptop containing the medical records of thousands of NFL players was stolen from the car of a Washington Redskins’ trainer. And while the team released a statement saying no health information protected under HIPAA guidelines was at risk, the incident shows that EMRs are vulnerable no matter the size of your company.
Ransomware to begin self-propagation
One of the biggest fears security experts have may be coming true: self-replicating ransomware. Viruses that have the ability to copy and spread themselves to new systems are nothing new, but until now ransomware attacks have been targeted campaigns.
OpenNotes portal initiative gaining steam
A recent initiative to give healthcare patients access to the notes their doctor or clinician writes about their visit is continuing its meteoric rise across the country. OpenNotes began a few years ago by researching the benefits of allowing patients to have access to their doctor’s notes.
Are your site’s images hiding an attack?
As more and more content management services are released to aid SMBs in online marketing, security risks also increase. One such helper is the image processing service ImageMagick. And while it has proven useful to countless businesses, it is now something you should be concerned about from a security standpoint.
Understand these 4 types of hackers
Why do hackers attack? Is it for money, notoriety, or political reasons? Many business owners never ask these questions, and instead only think about the means of how a cyber attack takes place. But knowing the motive behind a hacker’s attack can help you understand whether or not you’re a target and what data you need to protect.