Phishing Attack Definition Many people have tried to compile a concise phishing attack definition to explain what a phishing attack is, how it works, and what its consequences are. Unfortunately phishing attacks vary so much in nature -and evolve so quickly in sophistication – compiling a concise phishing ... Read more
Types of Phishing Emails As the sophistication of phishing evolves, there are many types of phishing emails that attempt to prompt recipients into an action that could have serious consequences for them or their employer. Online security companies do their best to combat new types of phishing emails as ... Read more
Effective Phishing Awareness Training In some employers´ minds, phishing awareness training consists of distributing a memo reeling off the top five tips for identifying a phishing email that have been copied and pasted from an 18-year-old´s blog page. This type of employer would be the first to tell you ... Read more
How to Prevent Phishing Attacks being Successful If your employees know how to prevent phishing attacks being successful, it can have a significant impact on your business´s online security – now more than ever. According to the July 2017 Intelligence Report from Symantec, there has been a significant increase in trojan malware ... Read more
What is a Phishing Site? Without exception, all Internet security experts agree it is important to know what is a phishing site. Phishing is the biggest online threat to individuals and businesses. It can be used to commit fraud and identity theft, or to install malware and ransomware onto computer ... Read more
HIPAA History A Guide to HIPAA History Our guide to HIPAA history explains the motives behind the Healthcare Insurance Portability and Accountability Act, details the dates on which the Act was created, passed and enacted, and looks at further events in the history of HIPAA that have ... Read more
HIPAA Laws A Guide to the HIPAA Laws Most individuals and organizations in healthcare-related industries are aware they have to comply with the HIPAA laws. However, as the rules generally considered to be the HIPAA laws cover such a wide range of healthcare-related services, they are written ... Read more
HIPAA Encryption Requirements The HIPAA encryption requirements may only cover a few lines of the Security Rule, but – when complied with – they can significantly reduce the likelihood of notifiable data breaches and the financial consequences of other Security Rule violations. What are the Two HIPAA Security ... Read more
OpenDNS Web Filter Review We start our OpenDNS web filter review by looking at how OpenDNS started, discussing what OpenDNS evolved into, and explaining the changes to its web filtering capabilities since the acquisition of OpenDNS by Cisco Systems Inc. Every computer, website, or app connected to the Internet ... Read more
MediaPro Phishing Training Solution The MediaPro phishing training program helps organizations assess their risk profile and develop training courses to suit their individual needs. The MediaPro phishing training program includes a phishing simulation program that can be used for susceptibility assessments and to monitor the effectiveness of training programs. ... Read more
PhishLine Phishing Solution The PhishLine phishing solution helps organizations improve their resilience against phishing and social engineering attacks. Employees are trained to recognize phishing attacks and are tested with phishing simulations. The aim is to change behavior and condition everyday employees to be more security aware, turning them ... Read more
SecurityIQ Phishing Solution The SecurityIQ phishing solution is a security awareness training program developed by the Infosec Institute that combines computer-based training with phishing simulations to improve resilience against phishing, spear phishing and social engineering attacks. Organizations can no longer rely on technology to block all phishing attacks. ... Read more
Sophos Phishing Solution The Sophos phishing solution is a new addition to the portfolio of cybersecurity products offered by Sophos. The Sophos phishing solution is an easy to use training and phishing simulation platform that helps organizations improve resilience against phishing attacks and train their employees to be ... Read more
Defend Your Brand Against Phishing Phishing attacks on employees are a major concern and rightfully attract a lot of attention, but it is also important to defend your brand against phishing. In addition to exploiting the human weaknesses of employees, phishers are hijacking brands and targeting their customers – potentially ... Read more
Ironscales Phishing Defense Platform The Ironscales phishing defense platform consists of a training program to teach employees about phishing and a phishing email simulation program to assess the effectiveness of training and give employees practice at identifying phishing emails in a safe environment. The company also offers an automatic ... Read more
PhishLabs Phishing Protection The PhishLabs phishing protection solution has been developed to improve organization’s resilience against phishing attacks by protecting organizations from the exploitation of people. People are organizations’ biggest cybersecurity vulnerability and they are frequently tested. Research conducted by PhishLabs indicates 91% of targeted cyberattacks on organizations ... Read more
Agari Phishing Solution In contrast to many organizations that offer anti-phishing protection, the Agari phishing solution does not train enterprise employees how to recognize phishing emails, instead the purpose of the Agari phishing solution is to prevent phishing, spear phishing and other malicious emails from being delivered to ... Read more
What is Phishing? Phishing attacks are regularly headline news, but what is phishing, how does it affect organizations and why are cybercriminals now turning to phishing as the primary way of attacking an organization? This article explains what is phishing, the various forms of phishing attacks and how ... Read more
How to Protect Against Phishing Considering the volume of IT security articles published on the Internet, you might expect everyone would know how to protect against phishing. Right? Wrong. Phishing is the number one cyber-threat to individuals, small businesses and enterprise-scale networks; and, no matter which source of research you ... Read more
Wombat Anti-Phishing Solution The Wombat anti-phishing solution is a software-as-a-service platform comprising security awareness training to improve understanding of the current cybersecurity threats, knowledge assessments to test threat awareness and phishing simulation exercises to reinforce education and provide practical experience of identifying phishing attacks. Wombat’s approach incorporates a ... Read more
Cofense The Cofense (previously called PhishMe) anti-phishing software comprises a suite of products that allow organizations to tackle ever-changing phishing threats and mount an impressive defense against all forms of phishing attacks. Threat actors are constantly changing tactics and are using highly sophisticated methods to steal ... Read more
Pager Replacement for Hospitals Smartphones have brought with them new possibilities, but also new challenges in healthcare. Physicians, nurses, and administrators carry to many devices. Many Physicians can be seen with a smartphone, tablet, and more than one pager. The antiquated system has become cumbersome for staff members and ... Read more
Secure Texting for Physicians A Solution to a Major Security Issue Secure texting for physicians is a solution to a major security issue potentially facing many healthcare organizations. Various studies have reported that more than 80 percent of physicians use personal mobile devices to support their workflows – exposing ... Read more
Secure Text Messaging for Healthcare How Mobile Usage Potentially Violates HIPAA Regulations Secure text messaging for healthcare has become an important compliance problem for healthcare organizations due to HIPAA regulations clearly stating that patient information must be kept secure at all times. The use of personal mobile devices allows medical ... Read more
Is Texting in Violation of HIPAA? Healthcare organizations that fail to prevent employees texting in violation of HIPAA expose themselves to the risk of civil action and substantial fines. Any breach of PHI that results from a misdirected or intercepted text, or the loss of a mobile device, can have serious ... Read more
HIPAA Texting Policy Why You Should Have a HIPAA Texting Policy A HIPAA texting policy is just one of a number of policies that should be developed, implemented and enforced in order to comply with the Health Insurance Portability and Accountability Act 1996. The policy for texting in ... Read more
HIPAA Compliant Texting App An Important Communications Tool for Healthcare Organizations A HIPAA compliant texting app is an important communications tool for healthcare organizations and other covered entities. Apps for HIPAA compliant text messaging can be used to comply with the administrative, physical and technical safeguards of the Security ... Read more
Web Content Filtering for Healthcare MSPs Web Content Filtering for Healthcare MSPs When managed service providers evaluate web content filtering for healthcare MSPs, there is plenty to take into account. Healthcare industry regulations, technological advances, and diverse work practices mean that clients´ demands are complex – and changing frequently. Finding a ... Read more
Internet Access Control for Hospitals How to Control Access to the Internet in Hospitals Before explaining how to control access to the Internet in hospitals, it may be beneficial for some to explain why Internet access control for hospitals is advisable. Filtering the Internet – and particularly wireless Internet filtering ... Read more
Web Filtering for Hospitals The Aims and Benefits of a Web Filter for Healthcare Organizations Web filtering for hospitals is a tool that can be used by healthcare organizations to control access to unsafe websites and downloadable files that may contain malicious software (“malware”). The aim of a web ... Read more