What are HIPAA Physical Safeguards? The Health Insurance Portability and Accountability Act of 1996 (HIPAA, PL104-191) was enacted to protect the privacy and availability of health insurance coverage and medical information. The law’s primary goals include protecting health insurance coverage for workers and their families in the event that the insured employee changes or loses […]
Tag: Cybersecurity
What are Productivity Tools? With so many productivity tools and applications available, employees are often keenly aware of alternative strategies for collaborating and getting work done. If employees feel that their cybersecurity practices and policies are creating obstacles and slowing them down, they are likely to look for ways around that by accessing other tools […]
What is Networked Medical Device Cybersecurity? The Internet of Things (IoT) is the interconnection and communication between internet-enabled physical devices. The growth of such devices has been explosive, as smart devices such as wearables, sensors, phones, cars, appliances, and household gadgets are becoming increasingly prevalent in more and more aspects of daily living. The proliferation […]
What is AI in Cybersecurity? Artificial intelligence (AI) has both advantages and challenges in cybersecurity. AI is a powerful cybersecurity tool, but it does have its limitations, and cyberattackers work tirelessly to find new ways to leverage its power for their cybercrimes. AI improves cybersecurity in the following ways: Vulnerability management. Traditional vulnerability databases manage […]
What are IT Security Training Topics for Employees? Human risk management (HRM) is a strategy for businesses to understand, reduce, and monitor their employee IT security risks. An important aspect of HRM is providing IT security awareness training so that employees are able to identify and address threats and to ensure that they have the […]
Malicious PDFs
What are Malicious PDFs? Portable Document Format (PDF) files were once considered to be immune to viruses, but PDF documents have evolved to incorporate more components that can make them vulnerable to viruses and other malicious content. These are a few PDF features and associations that can have underlying vulnerabilities: Multimedia content. PDF documents that […]
Buffer Overflow Attack
What is a Buffer Overflow Attack? In a buffer overflow attack, an application receives more input than it expects, which results in an error that exposes the system memory to malicious threats. While the buffer overflow is not a cause of damage, it does create a vulnerability that can be exploited by cyberattackers. One method […]
Cryptography
What is Cryptography? Cryptography is the study of secure communication techniques that allow only the sender and intended recipient of a message to view it. The term is derived from the Greek word kryptos, which means hidden. Cryptography uses mathematical techniques to transform data and prevent it from being read or manipulated by unauthorized parties. […]
FinTech
What is FinTech? FinTech (financial technology) is a term broadly referring to software, mobile applications, and other technologies created to improve and automate traditional forms of finance for individuals and businesses. A FinTech company refers to any business that uses technology to modify, enhance, or automate financial services for businesses or consumers.1 Examples of FinTech […]
Insider Threats
What are Insider Threats? The Department of Homeland Security (DHS) defines an insider threat as the “…threat that an employee or a contractor will use his or her authorized access, wittingly or unwittingly, to do harm to the security of the United States.”1 Insider threats are not only threats to national security, but they are […]