- HIPAA Compliance Guidelines
- HIPAA Compliance Training
- What is a HIPAA Violation
- What is HIPAA Compliance?
- HIPAA Training for Students
- What is PHI
- HIPAA Training for Employees
- Who Enforces HIPAA?
- Why is HIPAA Important?
- Class Action Data Breach Lawsuit Settled by UCLA Health for $7.5 Million
- Potential Huge Breach of Protected Health Information Discovered
- Minimum Security Standards Required for IoT Devices by Internet of Things Improvement Act
- Healthcare Employees Are Vulnerable to Phishing Attacks, According to Study
- 25% of Healthcare Organizations Have Suffered a Mobile Security Breach in Past Year
- Hospitals at High Risk of Suffering Devastating Cyberattack, According to Moody’s
- HIPAA Compliance Clashing with Healthcare Cybersecurity
- New Federal Data Privacy Act Proposed by Nevada Senator
- Definition of Personal Information that Requires Breach Notifications Expanded by New Jersey
- Facebook’s Health Data Sharing Practices Investigated by New York State Departments
- HIMSS Cybersecurity Survey: Phishing and Legacy Systems Raise Serious Concerns
- Phishing Campaign Leverages Google Translate to Steal Google and Facebook Credentials
- IDenticard PremiSys Access Control System Vulnerabilities Found
- Office 365 Phishing Campaign Uses SharePoint Partnership Request as Bait
- Latest Speedup Linux Backdoor Trojan Used in Widespread Attacks
- Xvideos Sextortion Scam Threatens to Disclose Porn Viewing Habits
- Latest Cybersecurity Framework for Medical Devices Issued by HSCC
- Apple IOS Vulnerability Allows Hackers to Spy on FaceTime Calls
- 0Patch Micropatches Issued to Respond to 3 Zero-Day Windows Bug
- STOP Ransomware Delivered through Software Vulnerabilities
- Cryptocurrency Mining Malware Tops Most Wanted Malware List
- North Carolina State AG Suggests Stricter Data Breach Notification Laws
- 773 Million Electronic mail Addresses and 21 Million Unique Passwords Listed for Sale
- Highly Sophisticated Apple Vishing Scam Identified
- SingHealth Breach Investigation Discloses Catalogue of Cybersecurity Failures
- January 2019 Patch Tuesday Updates
- HHS Publishes Cybersecurity Best Practices for Healthcare Organizations
- Importance of Safety Awareness Training Emphasized by Censuswide Study on Phishing Danger
- NIST Issues Draft Paper on Telehealth and Remote Monitoring Device Cybersecurity
- Adobe Patches Actively Abused 0-Day Vulnerability in Flash Player
- Why a Cloud Management Solution Must be Your Toolset-for-the-Cloud
- Spotify Phishing Scam Identified: User Accounts Breached
- California Wildfire-Themed BEC Attack Identified
- Five Stats concerning Cloud Usage in 2018
- Increase in Phishing Emails Using .Com File Extensions
- Gmail Bug Allows Phishing Emails to Be Transmitted Anonymously
- Q3 2018 Healthcare Data Breaches Report Released
- Eutelsat Selects TitanHQ to Safeguard its WiFi Networks
- Trump Spam Dominates Electronic mail Subject Lines in Run up to Mid-Terms
- Z Services Selects TitanHQ to Provide New Cloud-Based Security
- U.S. Treasury Probing $700,000 Loss to Phishing Scam
- Cofense Expands 24/7 Global Phishing Defense
- United States Leads the World as Primary Host of Malware C2 Infrastructure
- 75% of Workers Lack Security Awareness
- Brands Most Usually Spoofed by Phishers Exposed
- Anti-Phishing Working Group Publishes Q2, 2018 Phishing Trends Report
- Cofense Explores the Status of Phishing Protections in 2018
- Anthem Data Breach Settlement of $16 Million Agreed with OCR
- KnowBe4 Starts ‘Domain Doppelgänger’ Bogus Domain Identification Tool
- 2018 Has Seen a Noticeable Surge in Email Impersonation Attacks
- Cofense Looks Closely at Healthcare Phishing Attacks
- Pegasus Spyware Campaigns Gather Speed: Infections Identified in 45 Countries
- Latest Python Ransomware Threat Identified
- New Brazilian Banking Trojan Hides in Plain Sight
- Zero-Day Windows Task Scheduler Vulnerability Exploited by Threat Group
- Huge URL Deception Campaign Discovered Targeting 76 Universities
- Micropatch Obstructs Zero-Day Vulnerability in Windows Task Scheduler
- Ransomware Attacks Slow down as Cryptocurrency Mining Proves More Lucrative
- AdvisorsBot Malware Utilized in Targeted Attacks on Restaurants and Hotels
- New Crucial Apache Struts Vulnerability Found
- Necurs Botnet Now Dispersing Marap Malware
- Free Decryptor for Fileslocker Ransomware Created After Master Key Leaked
- Tribune Publishing Cyberattack Cripples Many U.S. Newspapers
- FTC Issues Warning Concerning New Netflix Phishing Scam
- Orange Livebox Modems Revealing WiFi Information
- Over 50 Accounts Compromised in San Diego School District Data Breach
- Backdoor and Ransomware Detections Rose Over 43% in 2018
- Actively Exploited Internet Explorer Vulnerability Patched by Microsoft
- 90% of Malware Delivered Through Spam Email
- BleedingBit Vulnerabilities Affect Millions of Wireless Access Points
- Elon Musk Bitcoin Fraud Makes $180,000 in a Day
- Zero-Day VirtualBox Vulnerability and Exploit Published
- WordPress GDPR Compliance Plugin Vulnerability Being Actively Abused
- Microsoft Patches 12 Critical Vulnerabilities on November Patch Tuesday
- Phishing Accounts for 50% of All Online Scams
- TA505 APT Group Dispersing tRat Malware in New Spam Campaigns
- APT28 Group Uses New Cannon Trojan in Spear Phishing Campaign Targeting US and EU Government Organizations
- Major Malvertising Campaign Identified: 300 Million Browser Sessions Hijacked in 48 Hours
- 49% of All Phishing Sites Have SSL Credentials and Show Green Padlock
- Marriott Announces 500 Million-Record Breach of Starwood Hotel Guests’ Files
- Microsoft and Adobe December 2018 Patch Tuesday Updates
- 2018 Safety Awareness Training Figures
- New Office 365 Phishing Attack Detected
- Vital AMP for WP Plugin Weakness Allows Any User to Gain Admin Rights
- Stealthy sLoad Downloader Executes Massive Reconnaissance to Improve Quality of Infected Hosts
- Zero-Day Windows Data Sharing Facility Vulnerability Discovered
- Exploits Published for LibSSH Vulnerability: Immediate Repairing Required
- Sophisticated Phishing Attack Inserts Malware into Existing Email Conversation Threads
- Microsoft Patches 49 Vulnerabilities Including One Actively Exploited Weakness
- Phishers Using Azure Blog Storage to Host Phishing Forms with Legal Microsoft SSL License
- Cofense Study Reveals Extensive Misuse of Zoho Email by Keyloggers
- Adobe Repairs Actively Abused 0-Day Weakness in Flash Player
- Persistent New LoJax Rootkit Survives Hard Disk Substitution
- Enhanced Remote Desktop Protocol Attacks Prompts IC3 to Issue Alert
- Danabot Banking Trojan Utilized in U.S. Campaign
- Q2, 2018 Saw an 86% Increase in Cryptocurrency Mining Malware
- About HIPAA 101
- Privacy Policy
- Terms and Conditions of Service
- Disclaimer