Hacker

Hacker Gets Arrested in TalkTalk Hack

They got him! Police have arrested a 15-year-old boy in Northern Ireland in connection with the hacking of the TalkTalk website.

TalkTalk is a broadband services company located in the UK. The TalkTalk website was down and stock in the company fell more than 12% when the news of the hack broke. Response from the authorities was almost unprecedented; illustrating that cybercrime will be vigorously addressed. The joint investigation that nabbed the ‘perp’ involved the Police Service of Northern Ireland (PSNI) ...

Continue Reading
0

See Your Company Through the Eyes of a Hacker

HIPAA security compliance is only one approach to protecting your data- as I’ve stated in prior posts, it is foundational only. It’s a start. It doesn’t fully represent a proactive approach to information security management. Covered Entities, even if HIPAA security compliant, do not do an adequate job of protecting their ePHI. One approach to improve this performance gap is to evaluate your security posture through the eyes of a hacker.

In a recent Harvard Business Review article, Nathaniel ...

Continue Reading
0

Lessons Learned from the Sony Hack

The recent Sony hack demonstrates again, what can happen to an organization who doesn’t take a more serious approach to information security. This latest breach has significant financial consequences. Exposed executive communications, publication of prerelease films and the cost to respond all negatively affect Sony’s bottom line. The lessons learned from the Sony breach apply to all businesses, including healthcare providers.

In his recent post, Timothy B. Lee of Vox discusses what we’ve learned from this hack.

Invest in network security. Most ...

Continue Reading
0

The Devious Mind of a Hacker

Most of our customers just ‘take our word’ about their network security vulnerabilities.  While respecting our security credentials, some decide not to take preventative action.  They don’t fully understand how their vulnerabilities can be exploited by the bad guys.  One particular entrenched vulnerability is called distributed denial of service attack (DDoS).  In nontechnical terms, I’m going to explain how this vulnerability is now being used to steal your protected company information.

A DDoS attack is staged by a hacker using multiple ...

Continue Reading
0