Healthcare IT Security at Risk Due to Business Associate Negligence

Healthcare companies and businesses that do contract work for them may soon be left singing the blues to the tune of an old popular song by The Who. I can hear the new lyrics now: “Too much, Omnibus.” That “too much” could refer to rising penalties for noncompliance with HIPAA requirements under the new Omnibus Final Rule Summary, which went into effect Sept. 23 and has a maximum penalty of $1.5 million per violation.

Continue reading

Beware Cyber Scams Disguised as Holiday Goodies, Greetings and Discounts

With Cyber Monday fast approaching, online shoppers need to be wary of Holiday Cyber Scams, where hackers try to infect unsuspecting users with everything from banking malware, such as the ZeuS Banking Trojan; Ransomware, such as CryptoLocker (malware which encrypts your computer files, which are held for ransom until you pay hundreds of dollars for […]

Continue reading

The Underground Hacking Economy is Alive and Well

Many businesses around the world are struggling financially, but sadly the underground hacking economy seems to be alive and well. In July of this year, the FBI charged two Russian hackers for hacking into US Financial Institutions that resulted in the theft of millions of dollars from more than 800,000 victim bank accounts. One of these same hackers and several other hackers, were also charged with the stealing and selling of at least 160 million credit and debit card numbers, resulting in losses of hundreds of millions of dollars.

Continue reading

Healthcare Industry Dodges Catch-22

Healthcare organizations are caught in a daily paradox reminiscent of Joseph Heller’s best-selling novel about WWII, “Catch -22,” a term which has come to mean “a contradictory or self-defeating course of action.” Now, with all the media attention over data security concerns surrounding personal health information (PHI), healthcare organizations need to be especially careful about securing their infrastructure.

Continue reading

Cyber Security for Small Businesses

The top three IT challenges facing small-business owners were listed as the cost of needed upgrades, security issues and the time it takes to fix problems, according to the National Small Business Association’s 2013 Small Business Technology Survey. Furthermore, 94 percent of small-business owners said they were very or somewhat concerned about cyber security, while nearly half of small businesses reported having been the victim of a cyber-attack. These attacks result in service interruptions and loss of staff time, and typically cost small businesses thousands of dollars.

Continue reading

Get Smart With Your Cyber Security

As the old TV crime fighter Maxwell Smart might say, “Would you believe…?” Would you believe that in August, a cyber-attack was launched via a third-party vendor on the New York Times website as well as on a dozen other organizations? According to the Ponemon Institute 2013 Securing Outsourced Consumer Data Report, 65 percent of organizations surveyed had an information security breach involving consumer data outsourced to a vendor, and 64 percent said it happened more than once. That’s why you have got to know about the cyber security posture of your third-party vendors and the ways they handle IT security issues with their own vendors.

Continue reading

How to Stay Ahead of Hacktivists Who Are After Your Organization

If your organization ever does or says something someone disagrees with, it could be targeted for a cyberattack. Grass-root marketing hackivists who find fault with your organization are experts at enticing people on social media and underground websites to join their cause to coerce your organization to change its policies or practices. In order to protect your organization, you need to know when hacktivists are targeting it or people affiliated with it. Hacktivists will often target staff or board members to ultimately harm your organization’s reputation.

Continue reading

How to Save Money with a PCI Forensic Investigator (PFI)

They may seem to have nothing in common, but retailers, nonprofits, universities, banks and law firms do one thing that puts them at risk for a cyber security breach: they accept or work with credit card companies. If your organization works with or accepts any payment card brand and has a cyber security breach, you may be required to hire a Payment Card Industry Forensic Investigator (PFI).

Continue reading

iPhone 5s Fingerprint Reader Hack

On September 10th Apple announced the new iPhone 5s. With many new upgrades, there was one new additional feature that particularly drew the interest of both the media and consumer. It was the announcement of the new fingerprint biometrics included in the iPhone known as the Touch ID®. Finger print technology as a means for identification in the security industry has been utilized for years. Apple is the first smart phone company to incorporate it into a hand held consumer device. The Touch ID® security is described as a way to use your fingerprint as a passcode. Apple has reported that “over 50% of smartphone users don’t use a passcode.” Apple’s Touch ID® is an easier way for the consumer to activate the feature and secure the contents of the device. As with all security related software, it is just a matter of time before someone breaks the code and designs a work-around. Ten days after the launch, the hacking team known as Computer Chaos Club (CCC) designed a work-around for the new fingerprint security system.

Continue reading

Online Tools

  • Print this Page
  • Share This Resource







By completing this form you'll be opting in to receiving future communications about products and services from Dell SecureWorks.