The Truth About Healthcare Cybersecurity

February 7, 2017

From 2015 to 2016, our country saw the number of Healthcare Cybersecurity breaches double. Since then, security breaches across all fields have continuously been on the rise, with 2017 ushering in some of the largest identity theft hacks in history. No one likes to hear that any personal information has been compromised, but it gets […]

Read the full article

Cyber Security: Online Crime Trends You Should Know About

October 25, 2016

This may be the first U.S. presidential election in history where cyber security has been a point of debate. Hillary Clinton used personal servers for government business, while Donald Trump’s corporate web servers were not secure. Politics aside, this drives home the point that cyber security experts have been making for many years: cyber security […]

Read the full article

Top 5 Security Apps for IT Professionals

July 27, 2016

As technology and the internet continue their rapid advancement toward the bold future, issues of cyber security remain a significant threat to companies of all sizes. IT professionals at the ground level have their work cut out for them when it comes to keeping their businesses and clients safe, which is why anything they can […]

Read the full article

IT Skills and Cyber Insurance Underwriting: A Winning Combination

June 14, 2016

In October 2015, the Insurance Information Institute (III) released a white paper entitled “Cyber Risk: Threat and Opportunity,” which stated that the number and impact of successful data breaches continues to rise. This is driving increased adoption of cyber insurance in an attempt to reduce risk. $2 billion was spent on cyber insurance in 2014 […]

Read the full article

Cyber Security: How to Ensure Your Risk is Reduced on Payment Gateways and the Cloud

March 28, 2016

The ability to accept online payments for goods and services is generally considered a good idea for businesses of all sizes, allowing transactions to take place when the buyer is not physically present. Obvious benefits include convenience, the ability to purchase from any Internet-ready device, and no requirement to travel to the store, which translates […]

Read the full article

9 Nontechnical Ways Hackers Secure Data

March 21, 2016

Considering an expensive technological upgrade to minimize the danger of a successful hacker breach? Think again! Installing all possible hardware and software upgrades will not protect your company from the human element. Your staff are a much more attractive target to cyber criminals and are hacked more easily than any technical restrictions present on your […]

Read the full article
Modis