Cybersecurity Archives - Adaptus

Monitoring of networks, endpoints, and cloud assets is a continuing cybersecurity challenge for many healthcare organizations, according to CynergisTek’s 2019 annual report. This is bad news because the attack surface at healthcare organizations is rapidly expanding as more systems and devices access their networks, it noted. Particularly disturbing, CynergisTek found that healthcare organizations’ compliance rate with the […]

Read More

The patient lying on the emergency room table in front of Paul Pugsley was having a stroke. Time was running out. Pugsley, an emergency medicine resident at Maricopa Medical Center, knew he needed to send the patient for a CT scan. But when Pugsley looked over at the computer screen at the side of the room, […]

Read More

The True Cost of Free WiFi Ease-of-access is a true double-edged sword. Like all powerful technologies, WiFi (public WiFi in particular) can be easily exploited. You may have read about attacks on publicly accessible WiFi networks, yet studies show that more than 70% of participants admit to accessing their personal email through public WiFi. WiFi vulnerabilities aren’t […]

Read More
2019 trends

The New Year has arrived and there’s no better way to start than by going through the past and learning from the experiences small and medium-sized businesses have had. Reports suggest that nearly 70 percent of SMBs have faced cyberattacks like phishing and web-based attacks.

Read More

An average of 5,000 to 7,000 new computer security threats are announced each year. Here's how to defend against them more effectively and efficiently.

Read More

The push to move everything into the cloud over the past several years has generated a large number of misconfigured and exposed deployments of various software stacks. This has attracted sophisticated attacks that destroy data or abuse server resources for cryptocurrency mining.

Read More

Security analytics/operations is a big data application, and big data applications are moving to the cloud. CISOs who still distrust the public cloud must face this fact. They will either figure out how to peacefully coexist with cloud-based cybersecurity analytics/operations or be left in the dust. 

Read More
biometrics

The method is not yet being widely utilized by consumers or enterprises – and for those who are using identification via fingerprint, voice, eye scan or facial recognition, security risks still exist.

Read More
Stepping out

Successful hacking campaigns used to be all about keeping under the radar. But, for some, making a big splash is now more important than lurking in the shadows.

Read More
predictions

The good news: advanced security technologies are constantly being brought to market. The not-so-good news: threat actors are not letting that get in the way; witness more intensified and ever more sophisticated attacks.

Read More