Skip links

Healthcare

Category Archive Subtitle
Threatening with Coronavirus Blog Featured Image

Beware the Newest Coronavirus Email Scam

It is a known fact that cybercriminals love to hijack global news headlines to spread their scams and increase their profits. This approach has reached a new moral low recently as cyberattackers threaten to deliberately infect people not with ransomware or malware, but with the
Medical Facilities Blog Featured Image

Cyberattacks Against Healthcare Targets Aren’t Going Away Anytime Soon

The New COVID-19 Reality The new coronavirus-induced reality has brought new challenges and new risks, specifically in cyberspace, as more and more organizations are required to go digital.  It’s no secret that cybercriminals often take advantage of vulnerable targets during times of crisis. Unfortunately, today’s coronavirus epidemic is no exception. Not only are businesses and governmental organizations
Work From Home Blog Featured Image

COVID-19 Opens Pandora’s Box of Cybercrime

The Lesser Known Side Effect No one needs a reminder of the enormous toll that the COVID-19 pandemic is inflicting on lives around the globe. It is affecting our physical and mental health, our economic prospects, and our connections to our loved ones. But as
Cactuscon Blog Featured Image

The Upshot: CactusCon 2019

Why Go? Last weekend, a fellow colleague of mine at Acronis SCS and I had the opportunity to attend Arizona’s premier security conference, CactusCon, in neighboring Mesa. The annual event, which began in 2012 and is now the largest conference of its kind in the
Critical Infrastructure is Vulnerable Blog Featured Image

Let’s Face It – America’s Critical Infrastructure Is Vulnerable

A Troubling Reality There’s no denying it. In today’s increasingly complex digital landscape, America’s critical infrastructure is more vulnerable than ever to cyber exploitation and attack. It doesn’t help that many of the organizations (both public and private) under the critical infrastructure umbrella lack the
blue chain link

Open Source Backdoors in the Wild

Open Source Backdoors in the Wild Malicious actors will take advantage of any opportunity to exploit an attack vector for money, personal gain, or fun. For years, hackers have used supply chains to deploy backdoors because trusted software provides a relatively easy entry point. This
CyberFit Tips Blog Featured Image

Trick or Treat Yo’self to Our Top 5 Cyberfit Tips

As you get your costumes and candy ready for Halloween, here’s another fun October fact – it’s National Cybersecurity Awareness Month! To help celebrate, Cyberfit Chip’s alter ego, Count Chipula, has turned to the good side this month, so he can offer up key tips to help
Firewall Ports Featured Image

99 Problems but Backup Firewall Ports Aren’t One

How do I love thee network engineer, let me count the ports. 3, that’s right just 3 ports (okay, maybe 5 if you want automated agent installs) you will need to open on your firewalls to get fantastic, fully functional data protection for your entire