A new report from Russian internet security company Kaspersky Labs states that crypto-focused malware which is easy to produce is increasingly being used.
According...
Reading Time: 5 minutesAs an active member of Toronto’s cybersecurity community, I was honored that RedBlack Cybersecurity founders Lee Kagan and Ben Wells...
This guidance aims to provide EU/EEA countries with an evidence-based framework to help develop, implement, monitor and evaluate their own national HBV,...
Reading Time: 3 minutesThanksgiving is a cultural holiday which signifies peace, thankfulness, and the beginning of the festive season. It was in the...
In August, as many as 1.4 million patient records were compromised at UnityPoint Health Systems when an email phishing scam breached the provider's network. This was the second of two cyber attacks on the Iowa-based health provider, with clinics and hospitals in Iowa, Wisconsin and Chicago. UnityPoint Health Systems Cyber Attack The first attack was...
Devices on the Internet of Things are a weak point in many networks. Too often, they have outdated operating systems and poor security protection. IT administrators can't get at their internals. Deploying insecure devices in healthcare systems can produce especially damaging consequences. Security Risks in Medical IoT Devices Health-related data is a prime target, and...
Reading Time: 3 minutes
It’s bad enough when ransomware infects an individual’s PC or smartphone. Not having access to locally stored files can really...