6 Most Dangerous Types of Phishing Scams to Watch Out for and How to Prepare for Them

According to Verizon’s 2020 Data Breach Investigations Report, phishing accounts for over 30 percent of breaches and remains the biggest threat to small businesses. What’s worse is that phishing attacks are growing even more sophisticated and malicious as many businesses continue to work remotely.

3 Reasons Not to Report a Ransomware Attack to the FBI

Las Vegas is the number-one worst city in America for ransomware attacks, according to a report by Malwarebytes. The FBI urges victims of ransomware attacks to report all infections, large or small. But if your business has been targeted, you might not be legally required to make a report.

HIPAA Cyber Attack Checklist

Next month, HIPAA cyber security best practices will be a hot topic in Las Vegas at the Healthcare Information and Management Systems Society (HIMSS) conference. One of the biggest questions likely to be asked is: what should you do in the event of a cyber attack?

According to the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR), your organization should follow this HIPAA cyber security checklist:
1. Execute your response and mitigation procedures.

Is Your Computer Network Secure Enough for HIPAA? 5 Best Practices

When it comes to protecting patient health information and complying with HIPAA, your Las Vegas health organization is under more pressure than ever before. Nationwide, HIPAA noncompliance fines totaled $19.3 million in 2017. Penalties have increased more than 300% since 2015.

Passing a HIPAA inspection by the Health and Human Services (HHS) Office of Civil Rights (OCR) hinges on your network security.

BYOD Best Practices, Part 6: 6 Biggest Risks for BYOD Data Leaks

At least 21% of organizations have suffered a data breach because of a BYOD device, according to a Skycure report. For all of the convenience of BYOD, it can quickly lead to a data breach if the right security precautions aren’t taken.

The risk is greatest when sensitive company data ends up on another unsecured consumer device owned by the employee.

BYOD Best Practices, Part 5: 5 People You Must Have on a BYOD Team

What’s the key difference between a smoothly efficient BYOD initiative and one that flops? Having the right people. In order to navigate the dangers of BYOD effectively, your Las Vegas company needs a team of outstanding people covering five distinct positions.

Need help protecting your business from data breaches? Let our FREE eBook show you the way.LEARN MORE HERE
+