Phase 2 OCR HIPAA Audits: What’s to Come in 2015?
Here is a high-level breakdown for the Phase 2 HIPAA Audits being conducted by OCR in 2015: Back in 2011, the Office of Civil Rights (OCR) was brought on-board to support a pilot HIPAA audit program with the goal of…
Read MoreMarch 11, 2015
NetMon: Quick Tips and Use Cases
When attackers are trying to break through your perimeter or are operating within your environment, you need to act quickly. Security intelligence is paramount. The good news is that you can detect most indicators of a threat from within the…
Read MoreMarch 6, 2015
FREAK: Organizations Need to Protect Themselves, Not Wait for Patches
This week, security researchers at SmackTLS, a new, potentially dangerous flaw that could allow hackers to trick Internet-enabled devices into using weak encryption. The bug, dubbed “FREAK” (factoring attack on RSA export keys). affects SSL/TLS protocols and could, therefore, be…
Read MoreMarch 6, 2015
TalkTalk Customer Data Breached
Last week it was revealed that UK telecommunications company TalkTalk suffered a data breach in 2014, where customer details—such as account numbers, names and addresses—were stolen. The stolen details were then used by scammers to trick people into believing they…
Read MoreMarch 2, 2015
Simulated Cyber Threat Thwarted at London’s BT Tower
Earlier this week, a simulated cyber terrorist strike took place at London’s BT Tower. The event—part of the UK government-backed Cyber Security Challenge—was designed to mimic a sophisticated cyber-attack and tested the ability of amateur contestants to defend the building’s…
Read MoreFebruary 27, 2015
Armed Forces the Latest to be Warned Against Cyber Attacks
A recent study by Lancaster University, The Future of Maritime Cyber Security, has found that Britain’s aircraft carriers and warships are at risk due to their reliance on ageing software. The research team has warned that the Royal Navy and…
Read MoreFebruary 17, 2015