Giva Blog
Help Desk, Customer Service, Cloud & Security Insights, with a Side of Altruism!

4 Best Practices to Protect You From Ransomware

Best Practices to Protect From Ransomware

The evolution of ransomware, dating back as far as 1989, has snowballed along with the development of technology to become a very profitable business for hackers. It is easier than traditional hacking, more efficient and allows them to cash in quickly and with minimal complications. Attackers can breach a vulnerable system through a back door and encrypt its data, which effectively shuts out users and prevents them from accessing any records or documents. A message demanding money then appears on the screen, a time limit is set and a countdown begins. The element of time implants a sense of urgency in the victim, compelling him/her to pay the ransom as quickly as possible. All this can be done from the comfort of a hacker's lair far away and almost impossible to track.

The reason why attackers are so successful in breaching electronic devices is because of the perceived distance people put between themselves and the possibility of such a breach ever happening to them. The belief that a ransomware attack is far-fetched is the very reason why ransomware is so lucrative. Putting your guard down is the vulnerability that hackers are waiting for. Below is a list of best practices that can help you protect and secure yourself effectively:

[Read More]

4 Human Errors in Cyber Security

Human Errors in Cyber Security

Human error is inevitable, and that is exactly what hackers count on. One slip-up can result in the loss of large amounts of data and cause a company to lose its credibility in the eyes of its customers. Overspending on high tech systems while neglecting employee training in cyber security is a poor strategy that will prove ineffective. It is also the main reason why human error is a leading cause of cyber attacks. Although it is not possible to completely eliminate human error, seeking ways to minimize it as much as possible will help reduce the occurrences of security breaches. In order to be able to do that, it is important to know the main sources of human error and how to avoid them.

[Read More]

CIO Events in the US for 2018

CIO Conferences and Summits 2018

2018 is proving to be a promising year for CIO development and innovation. CIO events are bringing more opportunities to the table, as participants are provided with time to network, meet and collaborate on bigger initiatives. Below is a list of the upcoming CIO events occurring in the US throughout the remainder of 2018:

[Read More]

Military War-Games: The New Healthcare Vulnerability Tests

Wargames Cybersecurity HIPAA Protection

The HIPAA Security Rule has a set list of requirements for covered entities to adhere to, all of which aim to ensure that organizations housing sensitive personal health information (PHI) are able to secure themselves against potential hackers. One of the conditions for being considered HIPAA compliant is to identify and protect against reasonably anticipated threats. 2017 was a year full of international cyber attacks, which heavily affected health care functions worldwide. Consequently, a new tactic that emerged and is currently being adopted by a growing number of healthcare entities is the use of military war-games to test the strength of cyber security barriers. This consists of a simulation of events that are controlled by the players in the game (in this case, hackers VS defenders).

[Read More]

3 Lessons Learned from 2017 HIPAA Violations

2017 HIPAA Data Breach & Violations

Even though HIPAA awareness and training is in abundance all across the US, the Department of Health and Human Services received 1,996 breaches in only the first half of 2017. It seems that no matter how hard organizations try, they continue to fall victim to breaches and attacks and do not take sufficient corrective measures to avoid future issues. In response, we have compiled a list of some of the most important lessons learned from 2017 HIPAA violations:

[Read More]

The Importance of HIPAA Compliance

The Imporance of HIPAA Compliance Data Security

Presence Health, a healthcare network based in Illinois, earlier in 2017 acceded to pay a $475,000 fine after not reporting a breach of unsecured protected health information in a timely fashion. Officials of the Office for Civil Rights (OCR) are noting that the length of time it took Presence to report the breach was not in accordance with HIPAA standards. This action represents the first HIPAA enforcement by the OCR on a healthcare provider for lack of timely notification of a breach.

[Read More]

Cyber Attacks on Canadian Businesses Rising

Canada Cyber Security

Cyber attacks are bad news for both business owners and consumers alike. It has become a serious problem for many Canadian businesses, as attacks of this nature are on the rise for the third straight year. In specific, instances of ransomware, malware and botnet attacks were expected to increase in 2017.

[Read More]

3 Factors Aiding Healthcare Cyber Attackers

Healthcare Cyber Crime

Healthcare providers and organizations are investing in cybersecurity with the growing pervasiveness and sophistication of cyber crime. Cyber criminality is becoming both more anonymous and more lucrative, opening the market for hackers and other cyber criminals to prey on healthcare providers. Despite the healthcare industry estimated to spend $65 billion on cyber security through 2021, cyberattacks are expected to quadruple by the year 2020. Regardless of financial precaution, cyber criminals are being aided by certain factors the healthcare industry has yet to remedy:

[Read More]

5 of the Biggest Threats Facing Healthcare Cyber Security

Healthcare Cyber Security Threats

With cyber attacks on healthcare becoming more sophisticated and pervasive, it is increasingly clear healthcare providers have insufficient and outdated approaches to security. Digital security utilized by most healthcare providers functions by protecting against individual and immediate attacks, instead of being a universal, extensive strategy. For healthcare providers, tending to and caring for ill patients is the top priority, so any breach of data or any C-Suite member becoming compromised would result in total calamity for healthcare centers and their patients.

The following are five of the biggest threats facing healthcare cyber security:

[Read More]

4 Reasons Why It is Important to Have Secure Business Associates

HIPAA Business Associates Data Security

The number of breaches of unsecured protected health information (PHI) on record in the United States is over 2000 and counting. Significantly, these records only cover breaches affecting 500 or more individuals. One can only wonder how many more breaches have occurred on a smaller scale. The types of breaches range from theft and hacking, to improper disposal and unauthorized access as a result of negligence. Such incidents can be avoided if covered entities (companies involved in healthcare) ensure that all of their business associates are secured. There are many reasons why it is important to have secure business associates. Being aware of these reasons may prompt covered entities to take the necessary measures to protect their clientele's information:

[Read More]

 

1   2   3   4   5   6   7     Older Entries