dark web

Throwing Light on the Dark Web

As recent reviews have shown, upwards of 80% of hacking-related attacks involve compromised credentials. Threat actors can target individuals and companies through many different types of cyber attacks, but where does their information come from in the first place?  It’s easy to find lists of usernames and passwords, sometimes for free, but more often for sale online. In fact, according …

healthcare security

The Cyber Trove of the Healthcare Industry

The past twelve months have been a strange time of evolving demands on global healthcare services, as well staggering transformations in the digital sphere. In many hospitals, these two topics overlap, as healthcare organizations are increasingly targeted in online attacks.  Healthcare workers don’t have time to digest information about cybersecurity and password practices. But each day threat actors bang at …

HIMSS

A Chronic Illness: Why the Healthcare Industry Needs an Update

According to the 2020 HIMSS Cybersecurity Survey With the continually expanding concerns of cyber-attacks on the healthcare industry, organizations must invest in secure systems. Breaches happen to healthcare organizations of all sizes because they are rich sources of sensitive information. The findings of the 2020 HIMSS Cybersecurity Survey suggest the rate at which healthcare organizations are improving their cybersecurity posture …

password hack

Pride and Passwords: Top Hacking Methods & How to Prevent Them

Cybersecurity is becoming a pressing issue for IT professionals in all fields. There are headlines every week about data breaches of all sizes and the attacks themselves come from many angles. This article details the password attack methods hackers frequently used against enterprises and provides solutions as to how your business can prevent damage or breaches. 1. Dictionary Attacks A …

benchmark

A Benchmark for Your Unsafe Passwords

News and warnings about data breaches and leaks abound at the moment, emphasizing the need for increased cybersecurity regardless of the industry. Microsoft’s Active Directory is often the perfect target for bad actors seeking to abuse compromised credentials. Despite the frequency of compromised credentials being the cause of data breaches, most organizations do not know whether their users’ passwords are safe. …

Biometrics Measure Up

How Biometrics Measure Up and Why They Aren’t the Cure-All for Cybersecurity

Each month there seems to be more news of data breaches, both large and small. As these events continue to increase in frequency, organizations are learning that they must engage, and rapidly, with new security measures. Companies are now turning their attention from password policies to biometric authentication solutions, without thinking every ramification through. The biometrics industry is expanding rapidly, …