How to defend against insider threats

First off, what is an insider threat in healthcare? An insider threat is an individual inside an organization discovered to have been accessing healthcare records without authorization. Healthcare companies must take steps to reduce the potential for insider threats, which is their top source of security incidents. #1 Educate – The workforce (meaning all healthcare employees) must be educated on allowable uses and disclosures of protected health information (PHI) and the risk associated with certain behaviors, patient privacy, and data security. For example, when a celebrity is admitted to hospital, employees may be tempted, just out of curiosity, to sneak…

Read more

“Black Dot of Death” locks iOS messaging app

People who use iPhones, iPads, and Macs are at risk of encountering a Unicode attack that can cause the messaging app to crash and lock up the device. The good news is a workaround has been found which can restore the state of said Apple products. What is going on? A bug, known as “Black Dot,” is locking the messaging app on Apple devices running iOS 11.3 and 11.4 beta with Apple TVs and Apple Watches also at risk. Black Dot is activated when an iOS user sends another user an iMessage (this is not an SMS) with an emoji…

Read more

Malware hits 500k IoT devices, Talos reports

A week ago, leading cyber threat intelligence team Cisco Talos reported that no less than 500,000 IoT devices in up to 54 countries were infected by new malware called VPNFilter. An earlier version, believed to be launched by a nation-state, targeted Ukraine. How VPNFilter Works Talos cited the vulnerable devices as Linksys, MikroTik, Netgear, and TP-Link networking equipment, as well as network-attached storage (NAS). Upon infecting a small office home office (SOHO) router, VPNFilter deploys in three stages. In stage 1, the malware imposes its presence by using multiple command-and-control (C2) infrastructure to capture the IP address of the existing…

Read more

Setting up your new laptop with Windows 10

First things first, what should you do with your brand new laptop? You go through the Windows 10 setup, and you’re all done, right? Not really. Your notebook isn’t ready — until you do some tweaking. Let’s get the ball rolling. #1 Check for updates Your new laptop should check for updates automatically, but you can also check manually. Just click the gear icon above the Start button to go to the Settings, choose Update & Security > Windows Update and then click the Check for updates button. (Or, just type “updates” into the search box and click Check for…

Read more

How WP security updates impact your site

WordPress (WP) websites require routine updates to keep up with user demands. Some of WP’s most critical updates are security patches, which protect sites from various cyberattacks. But why does your website sometimes act up when you finish running an update, and how can you prevent it? Be cautious with updates In 2017, WP issued 21 updates and 33% of these focused on security. Despite their many benefits, these updates caused some sites to crash and caused downtime related plugin incompatibilities. To take advantage of updates without experiencing any drawbacks, our technicians shared the following tips: Check plugin compatibility A…

Read more

How AI improves customer service

Exceptional customer service should be solution-driven, accurate, and fast. For many companies, that means recruiting the best crop of talents who can quickly learn their systems. But nowadays, businesses are turning to artificial intelligence (AI) to improve customer service. How AI capabilities enhance customer service AI has two capabilities that enhance customer service: machine learning and natural language processing. Machine learning studies historical customer data in your systems and equips your customer service staff with all the information they need to address concerns much faster and provide personalized product suggestions, discounts, and offers. It’s the same mechanism that enables Facebook…

Read more

Android P: Features to Look Forward To

Fans of Android mobile devices look forward to each new version of Google’s operating system as it shows off new features. Aside from being easier and more efficient for developers to create applications on it, there are some improvements for consumers to look forward to when they update or buy a device that runs the new Android P. App Actions and Slices App Actions aim to anticipate the next thing you may do on your smartphone. Actions such as beginning a workout or giving your spouse a call will appear in notification bubbles on top of the screen as suggestions…

Read more

The lowdown on virtualization and the cloud

Virtualization and cloud computing are sometimes used interchangeably, and it’s easy to see why people confuse the two. To set the record straight, virtualization is NOT cloud computing. But these two revolutionary technologies often overlap. Virtualization Imagine a company with five servers, each assigned a single task such as storage, email, etc. If one day there were a spike in email traffic, the email server might become overwhelmed, causing it to slow down. Adding another server would remedy the issue, but it would be expensive and inefficient on days with less traffic. With virtualization software, you can combine the resources…

Read more

5 new features for Outlook

Lately, Microsoft has given some love to Outlook — not just the desktop app, but also the web and app versions. In fact, they just released a bunch of new and improved features. Let’s take a look. #1 RSVP Outlook makes it fairly simple to invite people to a meeting, but now it will also keep tabs on who’s coming. Just click the new “Tracking” option under “Meeting Occurrence” and see who has committed to the meeting and who hasn’t. RSVP isn’t just available for the meeting organizer, but the attendees, too. #2 Multiple time zones Traveling internationally and trying…

Read more

Don’t give social media hackers a chance

Pranksters, malicious attackers, extremists — hackers come in different forms, but they all have one thing in mind: compromising your online privacy and security. Some of them specialize in hacking social media, but don’t fret; there are several things you can do to protect your Facebook or Twitter account. Lockscreens exist for a reason Make sure all your computing devices lock the moment you stop using them. This way, you are safe from the simplest hack of all: someone opening a browser on your computer that has your social media login saved. As long as your password isn’t your birthday…

Read more


Important
This site makes use of cookies which may contain tracking information about visitors. By continuing to browse this site you agree to our use of cookies.