Showing posts with label Data Security. Show all posts
Showing posts with label Data Security. Show all posts

Monday, June 21, 2021

Personal info of more than 500 patients taken during Farmington hospital data breach

Personal info of more than 500 patients taken during Farmington hospital data breach
| #TpromoCom #DataSecurity #DataBreach #Hospital | Hospital states there's no evidence that personal information has been misused (daily-times) https://bit.ly/2UrRZtP

A Farmington hospital has reported a data breach to its network in Fall 2020 that impacted more than 500 patients whose personal information was taken.

The hospital said in a statement there is no evidence of any personal information being misused from the data breach. (read more)


Education Is Important

Network technology has been around for quite some time Not all security techs have what it takes. You can enhance your employees' knowledge of IT by sponsoring them via Alison.
All of their courses are free.


Follow us on Social Media or email us:

Saturday, January 30, 2021

Shadow IoT

Shadow IoT | #TpromoCom #IoT #ShadowIoT #CyberSecurity | A big security problem can become a bigger opportunity for channel pros who can detect, secure, and manage rogue smart devices connected to business networks. https://bit.ly/3tbfBzK (James E. Gaskin

BUSINESSES HAVE STRUGGLED for decades with “shadow IT”—printers, laptops, smartphones, cloud services, and more being installed or subscribed to by users without permission or knowledge of an IT admin. In that same vein, users are now connecting smart devices of various kinds to the corporate network, giving rise to the term “shadow IoT.”

It’s a much bigger problem too, according to Zeus Kerravala, principal analyst at ZK Research, "because the scope has broadened. Things you never would have connected before are now connecting." As an example, he cites the Target breach from a few years ago. "The AC system was compromised, and it was on the same network as the point-of-sale system." When the hackers went through the AC system to the POS server, red flags theoretically should have gone up and the AC system should have been immediately quarantined.

Interested in knowing more about Shadow IoT and how to prevent it? 


Follow us on Social Media or email us:

Tuesday, January 12, 2021

What is a honeypot?

What is a honeypot? | #TpromoCom #Hacker #Server #Network #Security | Honeypots are decoy systems or servers deployed alongside production systems within your network (rapid7.com) https://bit.ly/3qdcd4P


When deployed as enticing targets for attackers, honeypots can add security monitoring opportunities for blue teams and misdirect the adversary from their true target. Honeypots come in a variety of complexities depending on the needs of your organization and can be a significant line of defense when it comes to flagging attacks early. 


This page will get into more detail on what honeypots are, how they are used, and the benefits of implementing them. 




Follow us on Social Media or email us: