For many years, financial institutions have understood the importance of having a strong cyber security strategy. As they handle valuable financial information and other sensitive data, these institutions have long been very attractive targets for hackers. As a result, they know they have to work hard to keep their customers’ accounts and data
As a healthcare provider, it’s essential that your information security is top notch. The Health Insurance Portability and Accountability Act (HIPAA) requires all organizations in the healthcare industry to take steps to keep their patient data safe. Are you doing enough to prevent a breach?
If you have any doubts about the security of your IT
The twin gas pedals of globalization and technology have increased the speed of business to the point where you can blink and suddenly not recognize the landscape around you. This is especially true when it comes to information security, where the very concept of “hacking” and data theft went from Hollywood science fiction to a pressing fact of
In the 2015 edition of its annual worst passwords list, password management company SplashData revealed the 25 most common (and most easily compromised) passwords for the year. Based on an analysis of more than 2 million passwords revealed through searches of publicly available plain text data dumps, the report found that the Internet public is
It’s no secret that 2015 was another challenging year in cyber security. While fallout continued from the Sony hack, new threats emerged and each one offered a lesson for the future. Here’s what can be learned from the past year as you plan for 2016.
1. Keep Backups
Over the last couple of years, many cybersecurity problems have come to light. There has been a wave of WordPress and Drupal vulnerability warnings and patches, and SQL injection bugs are being found left and right in Web applications. Many of the bugs can be traced back to PHP, but other common programming languages can also cause
Research shows that WordPress and health applications are the most popular targets for online attacks. If you’re currently using WordPress for your website or offering a healthcare app, here are some key facts and figures you should know.
Content Management Systems Are Most Vulnerable
A new report by Imperva revealed that content management
Once again, it’s time to plan your security budget for the next year. In our last post, we discussed planning and implementing as the first two steps of planning your 2016 security budget. Now, let’s look at the final two steps: execution and analysis.
Successful execution of a security plan involves detecting new risks and monitoring
Protecting the passwords of all your employees is a key part of IT risk management. Password management systems, in combination with other cybersecurity systems, can help to protect workers from becoming victims of hacking. Here are six of the best secure password management systems for businesses.
Dashlane Premium is available