Data loss is a concern for every business, regardless of industry. It takes an average of $150 per compromised file to recover from data loss, and with thousands of files compromised in the average attack, you’re looking at damages in the six or seven figures to recover from just a single incident.
That said, those dealing with a data loss incident will find themselves in a particularly difficult situation if they work in healthcare. In the healthcare industry you face the usual possibility of a class-action lawsuit from losing sensitive data, and then on top of that you’ve also got to worry about HIPAA.
Patient information is vigorously protected by HIPAA. Should you ever violate HIPAA by compromising sensitive information you’ll find yourself facing some very steep fines, with a maximum penalty of $1.5 million per provision violated.
We’re living in a world that, through smartphones and the cloud and other technologies, is more convenient than ever before.
The problem is that sometimes, if you’re not properly protected, those conveniences come at the cost of compromising security. This is especially true when you’re using public Wi-Fi that doesn’t require a password. Anyone else could get on that same connection, maybe even a cybercriminal who knows how to use that shared connection to get onto your network and start stealing your data.
Global Data Systems, Inc. knows how to keep your mobile devices secure, so when you’re at a coffee house or your hotel lobby or wherever else you’ve managed to wrangle a public connection, you can use it without having to worry about some lurking cybercriminal breaching your network.
We’re starting to feel how a dentist must feel when they tell their patients to brush and floss twice a day over and over again, and yet the same people come in again and again with cavities.
Don’t use simple, short passwords, people. Make them long, and throw in a few numbers and special characters in for good measure. It makes a difference, we promise.
Want to know more about what makes a strong password, or what else you can do to prevent unauthorized access? Give us a call at (888) 849-6818 or send a message over to info@GDSConnect.com to find out.
There were over 300 million new pieces of malware created in 2014. It’s hard for anyone to keep up with the constantly evolving threat landscape, but the cybersecurity community does its best, with software developers constantly releasing updates and patches to protect users from the latest discovered vulnerabilities.
It’s up to you to take advantage of their vigilance and make sure you download all those updates and patches.
When you think of cybercriminals getting their hands on your data, you probably think of that Hollywood image: some geek genius intensely focused, pumped up on Red Bull and Mountain Dew, fingers flying on the keyboard, breaking into your network with sheer coding prowess.
But in real life attacks aren’t quite as exciting as that classic image. Often they don’t require much coding skill at all, rather some phisher will figure out how to trick employees into letting them into your network rather than them finding a way in themselves.
Be careful who you trust, as not every phisher is as obvious as a faux Nigerian prince. Some of the more professional phishers out there are able to send convincing emails posing as intimidating authorities, usually the local police or the IRS.
Remember, always call to confirm that you do indeed owe an unpaid parking ticket or back taxes before you download any “payment software” from those claiming that you do.
Fool you once, shame on the cybercriminals. Fool you twice, well, that’s the fault of your employees, and it’s also your fault for not making sure your employees were trained properly.
As we just went over, people who convince employees into handling over sensitive data with a bow on it are just as dangerous as the ones who know how to get into your network and take it themselves without any tricks.
Some employees are so reckless they’ll even use a file sharing program to download music, movies, or whatever else illegally from a work computer.
Train your employees to browse the web responsibly and only open links/attachments from those they trust. Don’t be afraid to call out (and punish repeat offenders) those that don’t abide by your policies.