Blog

Tech tips, news, and expert insights

Are You Part of A Culture of Cybersecurity?

Introduction

Cybersecurity and cyber-compliance go hand in hand, and they’re much more than just buzzwords that you may have heard at work!

Keeping your most private data secure is not only important to your job; it’s mandated by law in many industries and important to the people whose personally identifiable information you manage and maintain.

Who Crossed the Red Cross?

Introduction

When you hear about the Red Cross, what first comes to mind? Is it donating blood and plasma? Is it disaster relief and recovery? Do you have some kind of personal story that goes along with the organization?

So in many ways, it makes sense that a threat actor who relies on social engineering techniques would try to capitalize on the Red Cross’s good reputation to trick victims into sharing personal information.

Why the Dark Web Loves PHI

Introduction

Private health information, better known as PHI, refers to all of that confidential patient data stored within health organizations’ physical and digital systems. Although PHI laws initially referred to verbal communication and physical
documents, the onset of the digital age guaranteed swift legislation aimed at covering that digital gap—for instance, the widely recognized Health Insurance Portability and Accountability Act (HIPAA) law of 1996.

If you work for a healthcare organization, or even occasionally contract with one (as a lawyer or tech support might), then you know just how important and confidential the data on your systems really is!

PHI on the Dark Web

PHI is one of the most valuable types of data on the dark web.

Behind the Average Ransomware Attack

Introduction

If you’ve been following this blog for awhile, then you’ve probably heard about the dangers of ransomware a lot. Hopefully, you’ve even picked up a few tips about how to recognize, handle and report ransomware schemes.

Just how bad can these attacks really get, though?

That’s exactly what we’re going to explore here.

The Pros and Cons of MFA

Introduction

How often do you use multi-factor authentication on a daily basis? What about weekly? Monthly? How many MFA codes have you entered the past year?

Whether it’s for work, school or just an account we use for fun, many platforms and applications now require more than just a password to log in!

So, why do security experts insist on using multi-factor authentication (which you may sometimes see referred to as two-factor authentication, TFA or MFA) so strictly and for every account?

Types of MFA

Multi-factor authentication adds an extra layer of security to your accounts, making them much more difficult for attackers to compromise.