Giva Blog
Help Desk, Customer Service, Cloud & Security Insights, with a Side of Altruism!

Cyber Attacks on Canadian Businesses Rising

Canada Cyber Security

Cyber attacks are bad news for both business owners and consumers alike. It has become a serious problem for many Canadian businesses, as attacks of this nature are on the rise for the third straight year. In specific, instances of ransomware, malware and botnet attacks were expected to increase in 2017.

[Read More]

3 Factors Aiding Healthcare Cyber Attackers

Healthcare Cyber Crime

Healthcare providers and organizations are investing in cybersecurity with the growing pervasiveness and sophistication of cyber crime. Cyber criminality is becoming both more anonymous and more lucrative, opening the market for hackers and other cyber criminals to prey on healthcare providers. Despite the healthcare industry estimated to spend $65 billion on cyber security through 2021, cyberattacks are expected to quadruple by the year 2020. Regardless of financial precaution, cyber criminals are being aided by certain factors the healthcare industry has yet to remedy:

[Read More]

5 of the Biggest Threats Facing Healthcare Cyber Security

Healthcare Cyber Security Threats

With cyber attacks on healthcare becoming more sophisticated and pervasive, it is increasingly clear healthcare providers have insufficient and outdated approaches to security. Digital security utilized by most healthcare providers functions by protecting against individual and immediate attacks, instead of being a universal, extensive strategy. For healthcare providers, tending to and caring for ill patients is the top priority, so any breach of data or any C-Suite member becoming compromised would result in total calamity for healthcare centers and their patients.

The following are five of the biggest threats facing healthcare cyber security:

[Read More]

4 Reasons Why It is Important to Have Secure Business Associates

HIPAA Business Associates Data Security

The number of breaches of unsecured protected health information (PHI) on record in the United States is over 2000 and counting. Significantly, these records only cover breaches affecting 500 or more individuals. One can only wonder how many more breaches have occurred on a smaller scale. The types of breaches range from theft and hacking, to improper disposal and unauthorized access as a result of negligence. Such incidents can be avoided if covered entities (companies involved in healthcare) ensure that all of their business associates are secured. There are many reasons why it is important to have secure business associates. Being aware of these reasons may prompt covered entities to take the necessary measures to protect their clientele's information:

[Read More]

7 Tips to Help Protect Yourself Against Hackers

Tips for Protection from Hackers

In October of 2016, a massive cyber attack against Dyn, a New Hampshire-based company that monitors internet traffic, blocked user access to many popular websites like Amazon, Twitter and Paypal. Hackers used a simple program that even novice hackers could use to access any device connected to Wifi. This is one of approximately 3000 cases in 2016 alone. Unfortunately, it is not possible to make yourself 100% hack proof, but here are some ways that you can make it difficult for hackers to access your information:

[Read More]

2 Important Recommendations That Can Help Ensure HIPAA Compliance

HIPAA Compliance Tips

For healthcare organizations, remaining HIPAA compliant can be both necessary and challenging. In the United States, healthcare organizations are required to abide by the Health Insurance Portability and Accountability Act (HIPAA) of 1996. This act provides guidelines pertaining to the handling of patient information across a number of platforms.

In an article by Kristen Lee, titled Q&A: The main reason healthcare organizations violate HIPAA, an interview is conducted with Michael Archuleta, director of IT and HIPAA security officer at Mt. San Rafael Hospital in Trinidad, Colorado. It is within this interview that Archuleta recommends two important items that can ensure HIPAA compliance:

[Read More]

4 Simple Tips to Improve Cyber Security Hygiene

Cyber Security Tips

Each year, Verizon compiles a Data Breach Investigations Report (DBIR). It is a comprehensive summary of data security threats and breaches that helps to better understand the landscape of cyber security.

[Read More]

The Risks and Benefits of Shadow IT

Shadow IT Technology

Shadow IT is a term used to describe solutions and systems created and applied inside organizations without their authorization. While they may not be authorized and can pose security risks, these solutions can aid in the development of new IT solutions.

[Read More]

Why HIPAA Violations are Becoming Common Among Healthcare Organizations

HIPAA Compliance Healthcare Organizations

In the United States, healthcare organizations are required to abide by the Health Insurance Portability and Accountability Act (HIPAA) of 1996. This act provides guidelines pertaining to the handling of patient information across a number of platforms. When healthcare organizations are looking for cloud solutions to manage their data, ensuring that it is HIPAA compliant is a necessity.

[Read More]

New Cybersecurity Laws for Canadian Businesses Coming Soon

Canadian Digital Privacy Act Cyber Security

It is no secret that Canadian businesses have struggled to bridge the gap between protecting both personal and financial data within their organizations. As a component of the Digital Privacy Act that was passed in 2015, the Canadian government is now in the final stages of enforcing legislation that will require all businesses in Canada to report any cyber security breach immediately.

[Read More]

 

Newer Entires     1   2   3   4   5   6   7   8     Older Entries