Self-Assessment Questionnaire (SAQ) P2PE Changes in PCI DSS v4.0
by Kyle Daun on April 3, 2023 at 1:45 PM
Right around this time last year, the Payment Card Industry Security Standards Council (PCI SSC) published version 4.0 of the PCI Data Security Standard (PCI DSS). PCI DSS v4.0 replaces version 3.2.1 to address emerging threats and technologies and enable innovative methods to combat …
The Healthcare Industry Remains a Favorite for Cyber Criminals
by Nicholas Foisy on March 27, 2023 at 9:30 AM
If you have had any exposure to news headlines over the past decade, it would come as no surprise to you that the healthcare industry has been one of the sectors most targeted by hackers and cyber criminals.
ProxyNotShell – Microsoft Exchange Exploit Explained
by Andrew Paull on March 23, 2023 at 1:15 PM
ProxyNotShell – What is it? Cyberattacks have become increasingly sophisticated and widespread in recent years, with hackers constantly finding new ways to infiltrate networks and steal sensitive information. One such vulnerability that has recently come to light is ProxyNotShell, ide …
What Is Password Spraying? How Can It Affect Customers?
by Jesse Roberts on March 15, 2023 at 2:00 PM
Brute force attacks like password spraying have been on the uptick recently, according to Microsoft's team of experts. Although only about 1% of these attacks are successful, they can be devastating. Affected companies often suffer serious financial and reputational damage.
HIPAA Compliance – Understanding Basic Best Practices
by Patrick Hughes on March 7, 2023 at 2:30 PM
Health Insurance Portability and Accountability Act (HIPAA) compliance is a critical facet of any healthcare organization's security measures. It is essential for businesses to take proactive steps to ensure that they comply with the regulations set forth by HIPAA. To help ensure comp …
Not Using Multifactor Authentication? Your Days Are Limited!
by Derek Boczenowski on February 22, 2023 at 2:30 PM
Despite the fact the multifactor authentication (MFA) has been around for decades at this point, the majority of both business and personal logins only use it when absolutely necessary. The complaints are well known; it takes too long to login, if I forget my phone or token I can’t lo …