Author Archives: John DiGiacomo

Medjacking is a Real Threat to Health Care Systems

Medjacking is a Real Threat to Health Care Systems

Cyber Security Data Breach

Medjacking, or medical device hijacking, is a new kind of cybersecurity threat to health care systems. Medjacking involves hacking into medical devices using backdoors to access software on the device. Since many of the vulnerable medical devices, such as life-support equipment and diagnostic equipment, use older or standard operating systems, the biggest challenge for a […]

Read more about Medjacking is a Real Threat to Health Care Systems

How Do Hackers Gain Access to Computer Systems?

How Do Hackers Gain Access to Computer Systems?

Data Breach

For many, the concept of system hacking is foggy, and few know how hackers gain access to computer systems. Cyber attacks have been evolving for decades. Once regarded as exploratory curiosity, hackers would access systems without permission only to see if they could. Hacking has converted over time into aggressive intrusions into computer systems for […]

Read more about How Do Hackers Gain Access to Computer Systems?

Cyber Security Best Practices

Cyber Security Best Practices

Data Breach

Attention to Detail and Diligence are Critical When Dealing with Cyber Security If the data breaches of the last couple of years are any indication, cyber security and data breaches will continue to make headlines in 2017. Most data security breaches are the result of an oversight somewhere in the system. Companies large and small […]

Read more about Cyber Security Best Practices

New Ransomware Offers Victims a Hobson’s Choice: Pay Up or Infect Two Colleagues

New Ransomware Offers Victims a Hobson’s Choice: Pay Up or Infect Two Colleagues

Data Breach

There is a new ransomware making the rounds that offers victims a Hobson’s choice: Popcorn Time ransomware. This ransomware gives the victim a choice: either pay the ransom amount to gain access to his or her data, or choose to pass the ransomware on to two unsuspecting colleagues. It hardly sounds like a choice, does […]

Read more about New Ransomware Offers Victims a Hobson’s Choice: Pay Up or Infect Two Colleagues

New York Imposes New Cybersecurity Regulations

New York Imposes New Cybersecurity Regulations

Data Breach

Effective January 1, 2017, banks, financial institutions, and insurance companies in New York will be required to comply with new cybersecurity regulations. The New York cybersecurity regulations are closely aligned with the Center of Internet Safety’s 20 CIS Controls. The CIS controls are the industry standard when it comes to cybersecurity and threat prevention. New York, being […]

Read more about New York Imposes New Cybersecurity Regulations

Quest Diagnostics Data Breach: Another Healthcare Hack

Quest Diagnostics Data Breach: Another Healthcare Hack

Data Breach

The Quest Diagnostics data breach is the most recent health care entity to be affected by security hack in 2016. In late November, Quest Diagnostic, a medical laboratory company used by countless health care entities nationwide, announced that it had recently identified itself as a victim of a data breach. According to the company, an unauthorized […]

Read more about Quest Diagnostics Data Breach: Another Healthcare Hack

We turn online legalese into crystal clear, actionable takeaways and guidelines you can use to make better decisions for your business.