Cybersecurity News Headlines Update on January 19, 2022

White House: REvil Arrests Include Alleged Colonial Pipeline Culprit One of the individuals arrested in Russia in connection with the REvil ransomware group is believed to be responsible for the May 2021 ransomware attack against Colonial Pipeline. That attack temporarily led to fuel shortages in parts of the US. Note International cooperation is critical to …

Combating Cyberattacks: How Payers and Providers Are Managing Digital Identity Authentication

The increasingly digital world of telehealth visits, mobile health apps and remote workforces has improved patient access to care but simultaneously increased a healthcare organization’s attack surface. As a result, cybersecurity is a top priority for many organizations. To understand the current state of healthcare identity access management, LexisNexis Risk Solutions commissioned Xtelligent Healthcare Media …

Risk Analysis and Risk Management Fuel Vancouver Clinic’s Strong Security and HIPAA Compliance Programs

When Michael Bray, Chief Information Security Officer at Vancouver Clinic (VC), first joined the team, he was responsible for building VC’s security program from the ground up—with an emphasis on HIPAA Privacy, Security, and Breach rules. Among the daunting tasks he faced was conducting a full inventory of all of VC’s assets, understanding the risks …

Is your VPN worth the risk?

Virtual private networks, or VPNs, are one of hackers’ favorite entry points into a network. Our VPN checklist helps you learn more about the symptoms associated with a broken and exposed third-party remote access system. Measure your VPN platform against standards to determine how effective it is for your network protection and overall productivity. Read …

The Critical Role of Email Risk Scoring in Fraud Prevention

Fraud leaders are pulled between two tensions: preventing fraud and supporting the friction-less transaction experiences consumers demand today. To achieve this, fraud teams need dynamic, global tools that evolve as fast as fraud tactics. This article will provide background on why the dynamic tool you need to put at the center of your fraud prevention …

What steps should you take if your identity is stolen?

With millions of Americans at risk of identity theft every year, staying vigilant is essential when it comes to your safety. Unfortunately, clearing your name and credit history can be tedious, but it’s not impossible. In fact, with a bit of work and diligence, you can correct the situation to minimize the damage and improve …

Cybersecurity News Headlines Update on December 29, 2021

Joint Log4j Cybersecurity Advisory Attackers are “actively scanning networks to potentially exploit” Log4j vulnerabilities, according to a joint advisory issued by cybersecurity organizations from the US, the UK, Canada, Australia, and New Zealand. The advisory offers technical details, mitigations, and additional resources. Note At this point, the importance of mitigating the log4j vulnerability should be …

Nightmare Cybersecurity Scenarios to Avoid in 2022

We’re close to the start of a new year, which means new priorities for businesses. Your plans should center around cybersecurity, especially since it looks like employees are likely to continue working remotely, possibly forever, at least in some capacity. Security incidents can be your worst nightmare if you’re an IT professional. They also strike …

Security Guide to Malicious Evasion Techniques

Organizations of all sizes are subject to ransomware attacks and the fallout is more consequential than ever before. As an MSP it is critical to stay up-to-date on common security risks to keep your company, and your customers, safe. In this article, you will learn the type of attacks that are most common, how evasion …

The latest insights on cyber security threats and mitigation strategies

Protect your business with the latest insights on cyber security threats and mitigation strategies with Tecala’s Cyber Security Report. Read this article to get back on-top of cyber security and stay there! In this article we cover: More billions invested into cyber Set adrift in a sea of attacks Threats may be exponentially larger than …