Cybersecurity Blog


Subscribe

Posts tagged: Compliance

Category: News

The Most Dangerous Tech Gift Under Your Tree

The Most Dangerous Tech Gift Under Your Tree


Posted December 20, 2016 in Malware, Data Breach, Compliance

Smart devices make great gifts but create serious security risks for your home network. Learn which gadgets are...

Peachtree Orthopedics Breach: 531,000 Patients Exposed

Peachtree Orthopedics Breach: 531,000 Patients Exposed


Posted December 16, 2016 in Data Breach, Compliance, HIPAA

Peachtree Orthopedics data breach affected over half a million patients but delayed disclosure. See why healthcare...

Yahoo Breach Lessons: 1 Billion Accounts Compromised

Yahoo Breach Lessons: 1 Billion Accounts Compromised


Posted December 15, 2016 in Data Breach, Compliance, Malware

Yahoo revealed one billion user accounts were compromised with names, passwords, and phone numbers. Learn the...

Yahoo's Biggest Breach Ever: 1 Billion Accounts Stolen

Yahoo's Biggest Breach Ever: 1 Billion Accounts Stolen


Posted December 14, 2016 in Data Breach, Malware, Compliance

Yahoo disclosed that over one billion user accounts were stolen in the largest data breach in history. Check if you...

US Responds to Russian Election Meddling

US Responds to Russian Election Meddling


Posted December 14, 2016 in Data Breach, Compliance, Cloud Security

The Obama administration expelled diplomats and imposed sanctions over Russian election interference. See the full US...

Obama Orders Full Review of Election Cyberattack Evidence

Obama Orders Full Review of Election Cyberattack Evidence


Posted December 9, 2016 in Data Breach, Digital Forensics, Compliance

President Obama ordered a comprehensive review of cyberattacks that influenced the 2016 election. See what the...

North Korea Hacks South Korean Military Cyber Command

North Korea Hacks South Korean Military Cyber Command


Posted December 6, 2016 in Data Breach, Malware, Compliance

North Korea breached the very unit designed to protect South Korea from hacking. See how this ironic cyberattack...

DDoS Smokescreen Attacks: The Real Threat Is Hidden

DDoS Smokescreen Attacks: The Real Threat Is Hidden


Posted December 5, 2016 in Malware, Data Breach, Compliance

Hackers use DDoS attacks as distractions while stealing data through a back door. Discover why the visible attack is...

Saudi Government Cyberattack Cripples Six Agencies

Saudi Government Cyberattack Cripples Six Agencies


Posted December 5, 2016 in Malware, Data Breach, Compliance

A massive cyberattack crippled thousands of systems across six Saudi government agencies. Learn how nation-state...

How to Avoid Millions in HIPAA Fines: Expert Guide

How to Avoid Millions in HIPAA Fines: Expert Guide


Posted December 2, 2016 in HIPAA, Compliance, NIST

HIPAA Business Associate fines are reaching record levels. Learn the compliance steps your organization must take to...

Cyber Monday Fraud: How Thieves Target Online Shoppers

Cyber Monday Fraud: How Thieves Target Online Shoppers


Posted December 2, 2016 in Data Breach, Compliance, Malware

Cyber Monday hit $3.39 billion in sales, making it a goldmine for cybercriminals. Discover the scams targeting...

GStreamer Linux Exploit: Backdoor Vulnerability Discovered

GStreamer Linux Exploit: Backdoor Vulnerability Discovered


Posted November 29, 2016 in Malware, Data Breach, Compliance

A new GStreamer exploit opens Linux Fedora users to backdoors and keyloggers. Check if your Linux system is...