Tag Search: cybersecurity
Posted on Monday January 07, 2019 | privacy, phi, healthcare, full disk encryption, cybersecurity, anti malware, access policies
Hospital data breaches are emerging at an alarming rate and show no signs of slowing down in 2019. That's because data fetches a hefty price on the black market, making hospitals prime targets for cybercriminals. The best way to defend against these threats is to arm your team with the following systems and protocols.
Posted on Monday December 24, 2018 | ransomware, mobile ransomware, data backups, cybersecurity, android
The increasing usage of mobile devices, specifically by businesses, will naturally entice more hackers to develop mobile ransomware. What is this form of malware, and how can you keep it from invading your Android device?
Posted on Wednesday December 12, 2018 | threats, tags: hardware, smartphone, mobile device, cybersecurity
Businesses have embraced mobile technology, as it allows for constant collaboration, which increases productivity. But as the number of mobile devices used in daily operations grows, so do the incidents of cybercrimes targeting smartphones and tablets. Protect your company mobile devices by following these steps.
Posted on Wednesday November 28, 2018 | white hat, hacking, gray hat, cybersecurity, black hat
Newspaper headlines and Hollywood movies have shaped our understanding of computer hackers, but in the real world it's not so simple. Some hackers are making massive contributions to the field of cybersecurity, it just depends on which hat they're wearing that day. Take a few minutes to learn about white, black, and gray hat hackers.
Posted on Wednesday November 21, 2018 | ransomware, privacy, malware, infosec, information security, cybersecurity, cybercrime, cyber threats, android mobile security, android device
When personal and professional information live on one mobile device, a small breach can have huge impacts. As the adoption of bring your own device (BYOD) policies increase, employee awareness of cyberthreats becomes critical. Here are five tips for avoiding common Android-based security risks.
Posted on Thursday November 08, 2018 | managed services, software, hardware, routers, operating system, cybersecurity, firmware
If most of your company's computers are obsolete, they double or even triple your chances of experiencing a data breach. This emphasizes how dangerous it is to have outdated applications, operating systems, and even web browsers. Failing to update your firmware could expose your business to major security threats.