HIPAA Business Agreements: Easy to Understand Basics

If you’re part of an organization that works closely with ePHI (electronic protected health information), you’ll need to understand the responsibility you bear when it comes to patient data. Both covered entities (CE) and business associates (BA) need to be part of a business associate agreement (BAA) as outlined by HIPAA policies. This blog post […]

election day 2020 absentee ballot

Election Day Free Of Cyberattacks, But How Long Will This Last?

While America waits with baited breath over the results of the 2020 Presidential Election, cybersecurity officials have been bracing themselves for an onslaught of cyber attacks. The good news is that for now, there seems to have been no interference from cybercriminals on Election Day. The Cybersecurity and Infrastructure Security Agency (CISA) and the National […]

work from home toxic people bad apple

Is Your Best Worker Toxic? Hire Someone Pleasant

One bad apple can spoil the bunch. A common phrase used to discuss a toxic person’s influence on an otherwise healthy group of people. Most people apply this phrase to someone in their personal lives, but could toxic people at work be spoiling your employee morale? While it’s easy to spot someone who isn’t pulling […]

CYBERCRIMINALS TARGETING WORLDWIDE GAMING INDUSTRY

The video game industry is a huge commercial market that generated $120.1 billion in revenue in 2019. Cybercrimes relate to the gaming industry are often difficult to trace, which is why attackers are increasingly targeting popular online games and community platforms. According to a recent report, some underground marketplaces that deal with the trading of […]

ZOOM CONFIRMS TWO-FACTOR AUTHENTICATION (2FA) AVAILABLE FOR ALL USERS

Zoom today confirmed two-factor authentication (2FA) will now be available for all users of the videoconferencing platform, which has come under intense security scrutiny as employees around the world continue to work from home to curb the spread of COVID-19. Zoom’s 2FA will let users opt for authentication apps such as Google Authenticator, Microsoft Authenticator, […]

TRANSPARENT SMARTPHONE FROM SAMSUNG COULD BE THE FUTURE

Samsung is developing a transparent smartphone, it seems. The company has patented one such design quite recently. This patent surfaced at WIPO, while Letsogodigital (and Guiseppe Spinelli aka Snoreyn) created some renders for everyone to check out. This patent was published on August 27, while it was filed back in January this year. It is […]

ONLINE CLASSROOMS POSE CYBER RISK FOR STUDENTS

This past spring, as the COVID-19 pandemic took hold, online learning became the new norm as universities and classrooms around the world were forced to close their doors. By April 29, 2020, more than 1.2 billion children across 186 countries were impacted by school closures. Shortly after schools began to transition to emergency remote learning, it became […]

AMERICAN PAYROLL ASSOCIATION SUFFERS DATA BREACH

The American Payroll Association (APA) has issued a data breach notification after being hit by a skimming attack. Threat actors installed skimming malware on both the login web page of the APA website and the checkout section of the association’s online store by exploiting a vulnerability in the APA’s content management system. The data security […]

THE RISE IN HEALTHCARE CYBERSECURITY INCIDENTS

The healthcare sector has been under tremendous pressure with the increase in the number of those afflicted due to the COVID-19 pandemic and cybercriminals have left no stone unturned to take advantage of this situation. As of August 13, 2020, the Department of Health and Human Services‘ HIPAA Breach Reporting Tool has recorded 302 major […]

AI DEVELOPED TO PROTECT MEDICAL DEVICES FROM MALICIOUS INSTRUCTIONS

Researchers at Ben-Gurion University of the Negev have developed a new AI technique that will protect medical devices from malicious operating instructions in a cyberattack as well as other human and system errors. Complex medical devices such as CT (computed tomography), MRI (magnetic resonance imaging) and ultrasound machines are controlled by instructions sent from a host PC. Abnormal or anomalous instructions […]