small business cyber security

Cyber Attacks are on the Rise for Small Businesses

Cyber security is something that small businesses should take seriously. Many small businesses tend to neglect cyber security because they typically do not think that they are a target for hackers. However, the number of cyber attacks made on small business entities has been on the rise for the pastCyber security is something that small businesses should take seriously. Many small businesses tend to neglect cyber security because they typically do not think that they are a target for hackers. However, the number of cyber attacks made on small business entities has been on the rise for the past

Breach Notification Laws Impose High Penalties

When there is a data security breach, there are state and federal data breach notification laws that places time limits on when those who are affected must be notified. A failure to make a timely notification of the data breach can be quite costly. Several state data breach notification lawsWhen there is a data security breach, there are state and federal data breach notification laws that places time limits on when those who are affected must be notified. A failure to make a timely notification of the data breach can be quite costly. Several state data breach notification laws

internet of things ransomware

Is Your Smart TV at Risk of a Ransomware Cyberattack?

As the number of physical devices that are connected to the internet increases so too does the threat of cyberattacks on physical devices that are part of the Internet of Things. Practically everything that has electronics nowadays is connected online in what is known as the Internet of Things. Vehicles,As the number of physical devices that are connected to the internet increases so too does the threat of cyberattacks on physical devices that are part of the Internet of Things. Practically everything that has electronics nowadays is connected online in what is known as the Internet of Things. Vehicles,

FDA: Make Medical Device Cybersecurity a Top Priority

  At the end of December, the Food and Drug Administration (FDA) issued new guidance for medical device cybersecurity. The new guidance encourages medical device developers and producers to make cybersecurity of networked medical devices a top priority throughout the product development lifecycle. It did not take long after the  At the end of December, the Food and Drug Administration (FDA) issued new guidance for medical device cybersecurity. The new guidance encourages medical device developers and producers to make cybersecurity of networked medical devices a top priority throughout the product development lifecycle. It did not take long after the

Massachusetts Publishes Archive of Yearly Data Breaches

The Massachusetts Office of Consumer Affairs and Business Regulation has published an archive of yearly data breaches, which provides data breach statistics collected by the office from 2007 to the present. These statistics clearly show that data breaches are on the rise in Massachusetts. Since 2007, in which there were 30The Massachusetts Office of Consumer Affairs and Business Regulation has published an archive of yearly data breaches, which provides data breach statistics collected by the office from 2007 to the present. These statistics clearly show that data breaches are on the rise in Massachusetts. Since 2007, in which there were 30

Watch Netflix? Beware of the Latest Email Phishing Scam

A Netflix phishing scam has been identified and users in the United States are being cautioned about an email that targets credit card information and other personal data. A California-based cyber-security firm recently identified a phishing email campaign affecting the popular video streaming service’s customer base. This latest attack isA Netflix phishing scam has been identified and users in the United States are being cautioned about an email that targets credit card information and other personal data. A California-based cyber-security firm recently identified a phishing email campaign affecting the popular video streaming service’s customer base. This latest attack is

top ten healthcare data breaches

Top Ten Healthcare Data Breaches of 2016

2016 was unkind when it comes to health care system data breaches. The top ten healthcare data breaches of 2016 affected more than 16 million people. There were more than 300 incidents of hacking and data security breaches throughout the year. The federal government tracks instances of healthcare data breaches2016 was unkind when it comes to health care system data breaches. The top ten healthcare data breaches of 2016 affected more than 16 million people. There were more than 300 incidents of hacking and data security breaches throughout the year. The federal government tracks instances of healthcare data breaches

medjacking

Medjacking is a Real Threat to Health Care Systems

Medjacking, or medical device hijacking, is a new kind of cybersecurity threat to health care systems. Medjacking involves hacking into medical devices using backdoors to access software on the device. Since many of the vulnerable medical devices, such as life-support equipment and diagnostic equipment, use older or standard operating systems,Medjacking, or medical device hijacking, is a new kind of cybersecurity threat to health care systems. Medjacking involves hacking into medical devices using backdoors to access software on the device. Since many of the vulnerable medical devices, such as life-support equipment and diagnostic equipment, use older or standard operating systems,

hackers gain access

How Do Hackers Gain Access to Computer Systems?

For many, the concept of system hacking is foggy, and few know how hackers gain access to computer systems. Cyber attacks have been evolving for decades. Once regarded as exploratory curiosity, hackers would access systems without permission only to see if they could. Hacking has converted over time into aggressiveFor many, the concept of system hacking is foggy, and few know how hackers gain access to computer systems. Cyber attacks have been evolving for decades. Once regarded as exploratory curiosity, hackers would access systems without permission only to see if they could. Hacking has converted over time into aggressive

New York Cybersecurity Regulations

Update: New York Cybersecurity Regulations Delayed

New York cybersecurity regulations were to take effect on January 1, 2017, as proposed by New York Governor Andrew Cuomo, which we wrote about here. But after leaders in the financial community voiced concern over the rules in late December, the effective date for the new cybersecurity regulations has been pushedNew York cybersecurity regulations were to take effect on January 1, 2017, as proposed by New York Governor Andrew Cuomo, which we wrote about here. But after leaders in the financial community voiced concern over the rules in late December, the effective date for the new cybersecurity regulations has been pushed