Security

Random entry RSS

  • Posted in:

    Understanding the Dangers Hackers Pose to Hospitals With Improperly Secured Cloud Apps

    The healthcare sector is entering a new era with the rise of genomics, big data harnessing, personalized medicine, and more. So, healthcare providers are embracing cloud services to:         Reduce IT costs,         Increase productivity,         Improve service quality. Why do Hospitals Use Cloud Apps? Cloud computing gives hospitals the chance to take advantage of high quality computing resources […]

    Read more

  • Posted in:

    Dropbox’s biggest data breaches and hacks

    Although  a great number of businesses uses Dropbox as their primary file hosting service, few people know how secure their corporate files are. Dropbox is not as insecure as some skeptics would suggest, but recent headlines about data breaches make us question its reliability for business usage. Why Dropbox Breaches Happen?         Anyone can access Dropbox shares […]

    Read more

  • Posted in:

    The dangers of using email for exchanging confidential documents

    Exchange of confidential documents via email has become a dangerous endeavor. This is especially true for law firms, investment banks and corporations. Take attorneys as one example. The bar obligates attorneys to protect the information of the clients, and apart from the financial damage the client may suffer, the attorney can be faced with a potential disciplinary measure. […]

    Read more

  • Posted in:

    Top Cyber Security Risks Affecting M&A Deals

    Businesses of all kinds are vulnerable to cyber attacks. Lloyd’s estimated that businesses lose up to $400 billion per year due to data breaches. With the recent growth in mergers and acquisitions activity — 2015 was the biggest year for M&A ever, according to the Wall Street Journal — deal activity is drawing the attention of cyber criminals. Although there was always the risk of deal information leaking, now that documents are shared electronically, the possibility of unauthorized access to documents is greatly increased.

    Read more