From information storage to disposal, there are many ways that your company’s IT management may not be following HIPAA compliance regulations. Review four of the most common compliance mistakes and some tips on avoiding them. 1. Discarding Information Improperly Proper information disposal prevents patient information from falling into the wrong hands. There are a number […]
Tag Archives: Technology Tips
As technology advances, new cybersecurity issues keep emerging. Digitalization has seen many businesses embrace new technological innovations to boost productivity. Alternatively, cybercriminals are continually developing new and sophisticated methods to gain access to confidential data, hence the need for companies to rethink their framework. The Verizon 2019 Data Breach Investigations Report (DBIR) found that 43% […]
Social Media giant Facebook, recently announced a new app aimed at Enterprise users. If you maintain an active corporate presence on Facebook and Instagram, you’ll be particularly interested in the company’s new offering. It is designed to give business owners a dashboard that will make it easier to manage their company’s social media presence, allowing […]
According to Alexa, Amazon is the 4th most visited website in the United States and ranks 8th worldwide. To say that it gets a lot of traffic every day would be an understatement, which is why a newly discovered phishing campaign pretending to come from Amazon is so disturbing. Although Amazon sees heavy traffic every […]
Bob Diachenko, the Director of Cyber Risk Research for Hacken, recently made a disturbing discovery. He found an ElasticSearch server open and vulnerable on the internet, without so much as a password to protect it. Unfortunately, the server was leaking a staggering 73GB of data and had a number of databases cached inside the server’s […]
In the world of data security, cryptocurrency mining software is often overlooked or discounted as a threat because it doesn’t do serious harm to the infected system. It bleeds off computing resources, putting them to work for the miners who control the software, working for them to solve complex cryptographic puzzles which generate revenue for […]