Category Archives: Cybersecurity

New Phishing Trick That Can Bypass Email URL Filters

There is a new Phishing trick that hackers have come up with, this trick is to make Office documents carrying malicious links undetectable by many email security services. They go about deleting the links from the document’s relationship file (xml.rels). This phishing trick has been seen by security professionals during email spam campaigns, these URL’s…

Read More

Users Affected by 19 Year Old WinRAR Flaw

WinRAR urges to update one of the worlds most popular compression software that had a flaw that 500 Million users in the past 19 years have been affected by and they finally released a patch for this flaw. What is the vulnerability? The UNACEv2.DLL vulnerability was discovered security researchers from Check Point Software and they…

Read More

Trickbot can now obtain your remote access credentials

The Banking Trojan called Trickbot has an updated ability and can now harvest your username and passwords from remote access type applications. This would allow the hacker to remote into systems using the username and password obtained. TrendMicro Analysts stated “The malware arrives via an email disguised as a tax incentive notification from a major…

Read More

HIPAA Compliance Checklist

Are you looking for a HIPAA Compliance Checklist to self-evaluate your practice or organization? I have created an easy to read document that does just that. This HIPAA Compliance Checklist was built upon a previous post called: HIPAA Compliance Program Tips which spoke about The Seven Fundamental Elements of an Effective Compliance Program Implementing written…

Read More

HIPAA COMPLIANCE PROGRAM TIPS

Here are the Fundamental and Practical Tips for achieving HIPAA compliance with your organization.  The Seven Fundamental Elements of an Effective Compliance Program Implementing written policies, procedures and standards of conduct. Designating a compliance officer and compliance committee. Conducting effective training and education. Developing effective lines of communication. Conducting internal monitoring and auditing. Enforcing standards…

Read More