Blog
Breaches at Two Maine Healthcare Providers Exposes Data on 52,000
Thu, 11/07/2019
Two breaches at healthcare providers in Maine recently led to the exposure of 52,000 patients' protected health information.
Blog
6 Tips for Safe, Successful Outsourcing
Mon, 11/04/2019
Vendor Credibility is KeyTrusted vendors can be invaluable business partners. However, vendor vetting and due diligence are crucial components to establishing partner credibility. Opening your network to an unscreened, unrestricted third party is the equivalent of unlocking the castle gates during a siege. Therefore, your organization must have a thorough vendor vetting process to ensure you are...
Blog
5 Simple and Effective Tips to Protect from Cyber Attacks for Cyber Security Awareness Month
Tue, 10/08/2019
This article was originally published on EIN Presswire on October 07, 2019.SACRAMENTO, CALIFORNIA, UNITED STATES, October 7, 2019 /EINPresswire/ -- To mark the month of October being Cyber Security Awareness Month, Beyond Security, a leading provider of automated security testing solutions, is providing 5 effective and easy to follow tips for protecting against Internet security threats that can...
Blog
You Can’t Protect What You Can’t See: Improving Cybersecurity with Monitoring Solutions
By Bob Erdman on Mon, 10/07/2019
Find out how SIEMs with threat escalation, centralization, diverse integrations, and collaboration with network monitoring tools can help clear the line of sight.
Blog
Employee Accessed, Abused Customer Data at American Express
By Cybersecurity Experts at Fortra on Wed, 10/02/2019
An employee - since terminated - at the financial services corporation is being investigated for fraud after accessing and stealing cardholder data.
Blog
Digital Guardian Designated a Cyber Catalyst By Marsh
By Greg Funaro on Wed, 09/25/2019
Digital Guardian is excited to share that our Data Protection Platform has been designated a Cyber CatalystSM solution!
Blog
OCR Outlines Best Practices for Managing Malicious Insider Threats
By Cybersecurity Experts at Fortra on Tue, 09/24/2019
The HHS Office for Civil Rights (OCR) is reiterating that when it comes to safeguarding critical data, healthcare organizations need to know the where, who, what, and how.
Blog
CVSS Explained
Tue, 09/24/2019
What Is CVSS?The common vulnerability scoring system (CVSS) is open and free to industry for evaluating the seriousness of the software security vulnerabilities and is used in vulnerability management software. CVSS gives scores to vulnerabilities per the seriousness of the threat. Scores are computed considering several metrics. Scores are given between 0-10, with most severe score being 10.First...
Blog
CVE Explained
Tue, 09/24/2019
About CVE (Common Vulnerability Exposures/Enumeration)Common vulnerabilities and exposure gives common names to openly known security issues or vulnerabilities. The objective of CVE is to make it simpler to impart information over different databases and make available a common platform to evaluate security tools.What is a CVE scan?CVE depends on freely accessible data. For the duration of the...
Blog
What is a Certified Information Systems Auditor (CISA) Designation?
Mon, 09/23/2019
Certified Information Systems Auditor (CISA)A CISA, or Certified Information Systems Auditor is someone that is certified to audit information systems (computers and networks) and the internal controls that a company has put around them to protect them from attack and subsequent compromise.What is a CISA Designation?The CISA designation is assigned to those individuals that have passed a rigorous...
Blog
SQL Injection Scanner Tools
Sat, 09/21/2019
Frequently Asked QuestionsWhat is SQL injection?What is SQL?How common are SQL injections?Am I at Risk for an SQL Injection Attack?What is SQL Injection?SQL injection is currently the most common form of website attack in that web forms are very common, often they are not coded properly and the hacking tools used to find weaknesses and take advantage of them are commonly available online. This...
Blog
What is Electronic Healthcare Network Accreditation Commission (EHNAC) Compliance?
By Cybersecurity Experts at Fortra on Thu, 09/19/2019
Learn about what the Electronic Healthcare Network Accreditation Commission, or EHNAC, is, its benefits, the accreditation process, and best practices in Data Protection 101, our series on the fundamentals of data security.
Blog
Former Google, Uber Engineer Hit With Trade Secret Theft Charges
By Cybersecurity Experts at Fortra on Wed, 08/28/2019
The latest wrinkle to the Waymo/Uber case serves as evidence that some of the largest, most successful technology companies aren’t doing enough to protect proprietary data, including trade secrets.
Blog
How Organizations Can Stay Ahead of Changing Privacy Laws
By Cybersecurity Experts at Fortra on Thu, 08/22/2019
GDPR, CCPA, PIPEDA. Privacy legislation is constantly changing these days. We asked 26 business leaders, security pros, and attorneys how to best stay ahead of changing privacy laws.
Blog
The Importance of Network Monitoring in the Internet of Medical Things (IoMT)
Wed, 08/21/2019
Learn why network monitoring software is critical for the Internet of Medical Things (IoMT) and keeping healthcare facilities and hospital networks healthy.
Blog
Data Classification: The 5 Steps to Effectively Classify Your Data
Fri, 08/09/2019
A corporate data security policy that sets out how valuable information should be handled will be ineffective unless it’s consistently and accurately enforced. Organizations often have a written policy that’s available on their company intranet and handed to new starters. In practice, however, employees are rarely sure how to apply it to their daily...
Blog
Types of Cyber Threats
Thu, 08/08/2019
What are Cyber Threats?A cyber threat is basically any type of threat that is computer related in nature. To be clear, a computer could be a desktop computer, a laptop, a tablet or even a smartphone. All of these devices have particular types of threats that they can be exposed to that users need to be aware of to ensure that they can protect themselves and their confidential information.Types...