TAP Into Technology Blog: IT Security (19)
[SlideShare] Tech Talk 2017: Sucking Mud, EL15 and Wave a Dead Chicken
The lazy days of summer are over and it’s time to sharpen our minds and have a few laughs along the way. In my third annual installment of Garland Tech Talk, I’m here to share with you the secret server-room jargon used in the cyber world....
Data at Risk Series: Cyber Security Needs of the Healthcare Industry
Back in 2013, the healthcare industry took over as the highest value sector of the United States economy with about $21.8 billion in revenue. Healthcare is huge and the sensitive nature of patient information and health records puts a big...
Hijacking Healthcare: Ransomware Attacks vs. Health Record Security
We’ve touched on the looming presence of ransomware in the healthcare industry in the past—but this year it hit especially close to home. In April 2017, Erie County Medical Center, located just a few miles from our Buffalo, NY office, was...
Restaurants Taking Measure to Guard Against Hacks
It’s just another night out with family and friends as you stop and have a bite to eat at your favorite local restaurant. Everything seems normal as the waitress comes over and hands you the bill. But this restaurant has adopted the new...
Ways to Protect Against Phishing
Just like the internet, phishing has evolved more and more over the years. Of the more than 537,000 phishing threats that were reported in the 2017 Global Spear Phishing Report, 91 percent (490,557) contained characteristics of display...
Historical Lookback - The Proof is in the Packet
"It's the Unicorn we've been looking for!" This was the response I got the other day when I was explaining to a customer the benefits of looking back at packets before and after they pass through an active, inline device and a packet...