Tag Search: security
Posted on Tuesday July 05, 2016 | wordpress 4 5 3, wordpress, website, updates, security, patches, bugs
WordPress is one of the most popular and reliable content management systems on the market, and for this reason it is also one of the most frequently targeted platform for hackers. Websites that are running older versions of WordPress are often vulnerable to security breaches and data leaks. Seeking to correct a number of bugs, WordPress recently updated to version 4.5.3, a release that doesn't provide much additional functionality but is highly recommended by the WordPress security team. Here's what you need to know about their latest security update.
Posted on Monday July 04, 2016 | threat, system, security, ransomware, office, network, microsoft, compromised, cerber, avanan, attack, 365
The Internet is a powerful platform that brings people together on a global level while giving them access to a wealth of information anytime they please. With the good, comes the bad - some utilize their skills in committing cyber crimes from the comfort of their own homes. Case in point, the recent Cerber ransomware attacked that ravaged millions of Microsoft Office 365 users worldwide. Here's what a security expert and Microsoft had to say about the matter:
Posted on Wednesday June 15, 2016 | washington redskins, theft, security, passwords, nfl, hipaa, healthcare, emr
ESPN recently reported that a laptop containing the medical records of thousands of NFL players was stolen from the car of a Washington Redskins' trainer. And while the team released a statement saying no health information protected under HIPAA guidelines was at risk, the incident shows that EMRs are vulnerable no matter the size of your company. That's why you need to have all medical records completely protected no matter where they are being stored.
Posted on Thursday June 09, 2016 | worm, security, ransomware, hackers, data loss, cyber criminals
Although some may have hoped that the threat of ransomware was on the decline, the reality is that it's quite the opposite. Until now, attacks seemed to be targeted directly at its victims, but Microsoft warns that may no longer be true. With their discovery of self-propagating ransomware it's vital to fully understand the possible risk of infection.
Posted on Monday May 23, 2016 | vpn, voip, security, encryption
As SMBs continue their steady transition away from traditional telephony services in favor of VoIP, threats of cybercrime and fraud are more common than ever before. Risks to VoIP systems are distinctly unique from those posed to your other networks and understanding how to combat them is critical. Here are 5 tips for securing your organization's internet-based communication devices and services.
Posted on Wednesday May 18, 2016 | technology, security, opennotes, online portals, healthcare, data
A recent initiative to give healthcare patients access to the notes their doctor or clinician writes about their visit is continuing its meteoric rise across the country. OpenNotes began a few years ago by researching the benefits of allowing patients to have access to their doctor's notes. Since that initial study, the number of healthcare providers who have agreed to sign on has steadily risen. What is this service and how does it work? Let's find out.
Page: 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647