Top 10 Cyber Security Tools for Small Businesses

Small businesses have few options for cyber security tools and even fewer resources to deploy and manage them. You must choose wisely to carefully balance low cost, ease of use, and high impact on the security posture of the organization. So what security tools should small businesses focus on? A SANS research paper has 10 suggestions for SMB security tools. The…

Top 5 Cyber Security Frameworks in Healthcare

HIPAA tries to force healthcare organizations to protect patient data – but does it work? Any health IT professional will tell you, HIPAA compliance alone does not guarantee security. HIPAA is not a complete security framework and it’s not enough to protect ePHI. Many hospitals, doctor’s offices, and others – while striving for HIPAA compliance – also follow one or…

4 Types of Social Engineering Used Every Day

Persuasion is part of life. We all try to persuade friends and loved ones to act in a certain way, usually with the best of intentions. Social engineering is when “persuasion” takes a darker turn. In a broad sense, it includes any action that attempts to influence a person to act against their best interests. Technically, acts that influence people…

Potential phone scam on those who say ‘yes’

WASHINGTON — Falling victim to a scam, apparently, can be as simple as just saying “yes.”  The Better Business Bureau and several law enforcement agencies are warning of a potential phone scam that involves a caller asking, “Can you hear me?”  As the victim answers “yes,” his or her reply is recorded. That enables the scammer, the BBB said, to use the recorded answer for signing up the victim for a product or service — and then demand payment. Scammers also can use the recorded answer to confirm a purchase agreement if it is ever disputed. Even though some people have reported…