Giva Blog
Help Desk, Customer Service, Cloud & Security Insights, with a Side of Altruism!

Blockchain Startup Chainalysis Helping to Arrest Cyber Criminals

Bitcoin Tracking Cybercrime

For the past several years, bitcoin has been a way to keep financial transactions discreet. It is incredibly difficult to trace, because it does not pass through a financial institution, and it is secure because it requires a two factor identification that uses a public key and a PIN combined with a mathematical function to allow a transaction.

This has made it easy for ransomware hackers to extort money by decrypting the victim's files. These types of attackers typically demand payment in bitcoin to keep from being traced. But for the past two years, Chainalysis, a bitcoin-tracing tech startup, has been selling its product to law enforcement agencies around the world.

[Read More]

Healthcare Industry Wants to Increase Cybersecurity

Healthcare Industry Increasing Cybersecurity

The Healthcare industry will forever be the target of cyber attacks due to the wide array of information included in the healthcare record. The 2016 HIMSS Cybersecurity Survey released in August shows that most healthcare executives are elevating data security as a business priority.

The survey asked 150 IT security leaders if they planned to increase cybersecurity awareness, in which case 85 percent of respondents said that they did. The numbers show that data security is an issue of concern for employees who handle information in the US health sector.

[Read More]

Healthcare IT Professionals Making Data Security a Priority

Healthcare Data Security

The health IT spending intentions survey conducted by TechTarget reveals that security is a top priority in the healthcare industry. The healthcare record is a valuable target for hackers and scammers, as it contains personal information, medical history and payment information.

[Read More]

CEO Scams Becoming Increasingly Dangerous Threat

CEO Email Fraud

The Federal Bureau of Investigation heeded caution from reports of an increase in CEO fraud email scams. CEO fraud occurs when a hacker fakes a message from the CEO of a company and attempts to persuade an employee to transfer funds to an unnamed beneficiary or provide private information of its employees.

[Read More]

Hospitals Vulnerable to Camouflaged Malware Infiltration

Hospitals & Malware

Data security in the healthcare industry is crucial for patient health and safety. By using camouflaged old malware, cyber attackers have been able to penetrate existing data systems. Old malware using a new identity render these viruses unidentifiable by antivirus systems used in the healthcare industry.

[Read More]

Data Breach Trends in Higher Education

Data Breaches Higher Education

With higher education becoming increasingly more available, data breaches are on the rise as well. Colleges are responsible for compliance with security regulations, such as FERPA (Family Educational Rights and Privacy Act), as well as attempting to monitor use of personal devices as they have become a crucial component of classrooms and campus life. Hackers are targeting educational institutions more than ever, so effective data security is critical.

[Read More]

Why Succumbing to Cyber Extortion is Dangerous

Cyber Crime, Ransomware & Data Security

On February 5, 2016, the use of ransomware on Los Angeles' Hollywood Presbyterian Medical Center caused a shutdown of their systems and served as a reminder of the increasingly pressing issue of cyber extortion. The hospital released a statement reassuring that neither patient care nor employee or patient information were compromised during the attack. The statement also clarified that initial reports that the hospital paid $3.4 million to the hackers were mistaken, but the hackers walked away with just short of $18K, as it was deemed the "quickest and most efficient way" to obtain the decryption key so they could regain access to their systems. The issue with this statement is that paying the ransom does not guarantee the return of data. In fact, most IT and security resources agree that paying is confirmation to cyber attackers that they should return in the future.

[Read More]

3 Ways Companies Can Combat Phishing

Combating Malware & Phishing

Despite the advanced technology and insight into data breaches, many companies still find themselves victims of silent attacks conducted by hacking professionals. While there are few ways to prevent these attacks, there are multiple precautions you can take to protect your company and your customers.

Data breaches can occur when malware is downloaded onto a device. Malware consist of different viruses and software that collect private information without the target ever knowing. Most commonly, data breaches are performed using phishing, which occurs when one is sent emails or texts containing links to malware. They are cleverly disguised as normal emails that do not always look suspicious to the unsuspecting eye, or even appear "friendly," which are why many people fall victim.

[Read More]

The Benefits of Ethical Hacking

Ethical Hacking

Can you imagine a world where hacking was no longer a threat and security was stronger than ever? This is potentially the future of technology if efforts strive to invest time and money into a new generation of so-called "white hat' hackers.

In a recent article on Medical Economics' website, Giva proposes a 5-to-1 ratio of software developers to ethical hackers. This article calls for hefty fees that should be paid to registered ethical hackers for finding weaknesses or gaps in a company's system. Due to the good money opportunity by taking this path, it would persuade those with hacking skills to use their skills to improve technology instead of attacking it. A better future starts with the decision to work for it, and the development of an ethical hacking field is a crucial first step towards a brighter one.

New Ways to Combat Healthcare Data Breaches

Healthcare Data Breaches

Do you feel uneasy writing out all of your personal information in a hospital waiting room? You are not alone and your worry is not without reason. Data breaches are becoming more and more frequent, and identity theft has become a sustainable business that will not be eradicated at any time in the near future.

In Giva's recent article, "Healthcare Data Breaches on the Rise: Implications and Solutions" published by Becker's Health IT & CIO Review, a new solution is proposed in a way which renders the data "valueless" to hackers. The article explains a new system that, once implemented fully, would provide aliases for each patient so that hospitals and healthcare workers can focus on their already-challenging jobs instead of worrying about also protecting vast amounts of Protected Health Information (PHI).

 

Newer Entires     1   2   3   4   5   6   7     Older Entries