Category Archives: Cybersecurity
What Are The Top Office365 HIPAA Mistakes
Office365 is a fantastic product, and it can certainly be HIPAA-compliant. But only if you take the time to set everything up the right way for the organization. Here the top Office365 HIPAA mistakes that we see organizations make: Free Outlook.com is not HIPAA compliant! Unfortunately, Microsoft’s HIPAA Business Associate Agreement (BAA) doesn’t cover their free…
Keeping Windows 7 Will Put Companies And Users At Risk
Keeping Windows 7 will put Companies and users at risk if they do not move onto Windows 10. Microsoft will terminate support for Windows 7 on January 14, 2020 and this is coming up quickly there is not much time. It’s not just Windows 7 and Windows Server 2008 that are approaching the end of…
Government Database On 92M Brazilians Found For Sale
A Government Database on 92 million Brazilians was found for sale on a dark web forum. Following a tip-off from a analyst known as Breach Radar, a BleepingComputer reporter investigated the auction of an alleged government database containing the personal information. It was found that the seller called X4Crow was claiming that the database includes…
5 Points To Success In A Zero Trust Model
If you did not know already, a Zero Trust security model is based on the creation of zones and segmentation to control sensitive IT resources. This also entails the deployment controls to monitor and manage data between zones, and more importantly, user interactions within a zone(s). Based on the Forrester Research the Zero Trust Model…
Best HIPAA Compliant UTM Firewalls
Do you know what UTM firewalls are the best to use to be HIPAA compliant? Is your Network Secure? How is your organization doing with UTM Firewall logging? If you don’t know the answer to these questions, you’re not alone. I am going to bluntly state that medical offices need to have a UTM Firewall …
Simple Checklist For Creating A Business Continuity Plan
No one can predict the future; however, you can be ready with a sound business continuity plan. The business continuity checklist is the first step in the BCP process. The checklist is not an exhaustive list, it is a simple tool that can be used to ensure that the basic BCP process has been initiated and the…
Apple iTunes Bug Exploited To Deliver Ransomware
The Hackers have been exploiting the “unquoted path” flaw in the Bonjour updater in iTunes for Windows to deliver BitPaymer/iEncrypt ransomware. The Researchers from Morphinsec Labs have identified this flaw with Bonjour updater back in August the team from Morphisec immediately disclosed the vulnerability to Apple. Apple has recently patched the flaw for Windows. Windows…
What Firewalls To Use To Be HIPAA Compliant
Do you know what firewalls to use to be HIPAA compliant? Is your Network Secure? How is your organization doing with logging? If you don’t know the answer to these questions, you’re not alone. I am going to bluntly state that medical offices need to have a UTM Firewall (Unified Threat Manager Firewall) appliance. These…
Does A Office Printer Have To Be HIPAA Compliant?
Ensuring that your office printer is HIPAA compliant isn’t only important for the security of your patients but it’s also the law. That being said, all printer technology must be secured and maintained according to the standards outlined in HIPAA. Types of print technology defined: Print technology is defined as printers, copiers, multifunction printers,…
Google Warns Zero-Day Bug For Android Under Active Attack
Google has stated a warning of an Android zero-day flaw actively being exploited in the wild. This flaw impacts 18 Android models including Google’s flagship Pixel, Samsung, Huawei and Xiaomi. Project Zero member Maddie Stone wrote in a technical post . which said the unpatched vulnerability(CVE-2019-2215) can be exploited in several ways. In one scenario, a…