Have you ever wondered what a Salted Hash was? Well, here is the Cliff Notes’ Version Hashing is a function…
Jeffrey Jones
The University of Vermont (UVM) Health Network has now successfully restored access to the Epic electronic medical record system at…
Helsinki, Finland (CNN) The confidential records of thousands of psychotherapy patients in Finland have been hacked and some are now…
The Open Systems Interconnection model (OSI model) is a conceptual model that defines the communication functions of a telecommunication or…
Exploit code for a severe privilege escalation bug in the Netlogon Remote Protocol for Domain Controllers on Windows networks has…
Federal Government Issues Warning for North Korea Hacker Group
The FBI has observed cyber criminals targeting computer network infrastructure after an operating system achieves end of life status. Continuing…
Surprising Healthcare IT Security Statistics This will blow you away. This is a list that provides a lot of insight…
The rise of cyber crimes continues to accelerate, and that is quite evident with the recent attacks that have compromised the security of many organizations, including the established ones in the industry. Ransomware such as WannaCry, Petya, and ZCryptor have caused financial and reputational damages to organizations throughout the globe. While it is impossible to eliminate entire cyber threats, well-designed cyber security programs can actively mitigate the impact of cyber attacks and enhance the network security posture of an organization.