Breach Prevention & Response

News, Tips & Best Practices for Preventing and Responding to Incidents and Breaches

  • Adversary Validation Service Overview Sheet

    Adversary Validation Service Overview Sheet

    Adversary Validation discovers vulnerabilities with no disruption to network operations and allows your organization to remediate before the malicious hacker can exploit your environment.

    Read More
  • Welcome To Your Worst Day Ever: A Ransomeware Preparedness Seminar0:00

    Welcome To Your Worst Day Ever: A Ransomeware Preparedness Seminar

    The threat of a ransomware incident in healthcare looms over the minds of many healthcare, executives and boards. Those who have already had the misfortune to deal with a ransomware incident will like

    Watch Video
  • Offensive Security Services

    Offensive Security Services

    CynergisTek's offensive security services test an organization's environment and people to validate the effectiveness against cyber attacks.

    Read More
  • A look at Darkside ransomware. Ransomware attacks on schools are up. REvil hits Acer. California state employee exposes COVID patient data.

    A look at Darkside ransomware. Ransomware attacks on schools are up. REvil hits Acer. California state employee exposes COVID patient data.

    Caleb Barlow offers commentary on the recent story about a California state employee exposing the COVID-19 test and tracking data of more than two thousand people.

    Read More
  • State of Healthcare Security 2020 Annual Report

    Download
  • California breach highlights contact tracing data vulnerabilities

    California breach highlights contact tracing data vulnerabilities

    Caleb Barlow offers commentary on the recent story about a California state employee exposing the COVID-19 test and tracking data of more than two thousand people.

    Read More
  • Plan for, Recognize and Respond to Cyber Incidents

    Learn More
  • Microsoft Exchange Server Breach

    Microsoft Exchange Server Breach

    In this infographic, we depict Microsoft Exchange Server Breach response procedures if exploitation activity is discovered.

    Read More
  • Ransomware Attack's Economic Impact: $67 Million

    Ransomware Attack's Economic Impact: $67 Million

    Marti Arvin discusses ransomware attacks and other disruptive cyber incidents that have been surging in the healthcare sector, especially during the COVID-19 pandemic.

    Read More
  • Seven Strategies From The Pandemic To Protect Healthcare From Ransomware

    Seven Strategies From The Pandemic To Protect Healthcare From Ransomware

    Caleb Barlow discusses the rise of ransomware attacks in healthcare and breaks down seven strategies that can protect healthcare organizations from ransomware.

    Read More
  • Why Working With a Security Consulting Partner Can Help Reduce Cyber Risk

    Why Working With a Security Consulting Partner Can Help Reduce Cyber Risk

    The market for working with a security consulting partner has increased. Working with a security consulting partner can help your cybersecurity strategy.

    Read More
  • Security Control Validation Assessment Overview Sheet

    Security Control Validation Assessment Overview Sheet

    Security Control Validation Assessment measures the capability of your security teams, processes, and technology to determine the organization's overall business risk.

    Read More
  • US Treasury: Paying Ransomware Gangs Could Violate Regulations

    US Treasury: Paying Ransomware Gangs Could Violate Regulations

    Caleb Barlow provides commentary on The Treasury’s Office of Foreign Assets Control warning companies that they could be fined for paying or facilitating ransom payments to cyber-criminal gangs.

    Read More
  • Security Awareness Tips

    Security Awareness Tips

    The Security Awareness Tips list allows you to download, customize, and share tips and best practices to your clients to give them insight on how they can protect their data.

    Read More
  • Attack on Universal Health Services a cry for change

    Attack on Universal Health Services a cry for change

    Caleb Barlow, CEO of CynergisTek provides his expertise in this article regarding the Universal Health Services ransomware attack.

    Read More
  • Ransomware Preparedness Checklist

    Ransomware Preparedness Checklist

    Ransomware is a trending topic for healthcare in 2020. The following checklist delivers tips and best practices to enhance your posture when dealing with ransomware.

    Read More
  • Netwalker, the Powerful New Strain of Ransomware Used Against Equinix

    Netwalker, the Powerful New Strain of Ransomware Used Against Equinix

    Caleb Barlow discusses the recent ransomware attack on Equinix infrastructure disclosed earlier this month. Equinix stated it has been fully contained, with no customers affected and no data loss.

    Read More
  • Lessons from the ransomware death: Prioritize cyber emergency preparedness

    Lessons from the ransomware death: Prioritize cyber emergency preparedness

    Caleb Barlow provides commentary which discusses the recent ransomware attack at Duesseldorf University Clinic (UKD) in Germany that led to the death of a patient.

    Read More
  • Moving Forward: Setting the Direction | 2020 Annual Report

    Moving Forward: Setting the Direction | 2020 Annual Report

    Our third annual report, Moving Forward: Setting the Direction, our analysts combed through data of the nearly 300 assessments performed to show the state of healthcare security in 2020.

    Read More
  • EHR Vendor Settles HITECH Fraud Case

    EHR Vendor Settles HITECH Fraud Case

    Marti Arvin offers commentary for this article which focuses on the recent announcement from federal prosecutors who have agreed to pay $500,000 to settle the 2015 HITECH fraud case.

    Read More
  • Data Security: Telehealth's Achilles Heel?

    Data Security: Telehealth's Achilles Heel?

    This article includes results from CynergisTek’s recent telehealth survey Telehealth & Data Security: Understanding the Risks and the use of hospitals using telehealth if their data has been hacked.

    Read More
  • Unsecured Database Exposed on Web - Then Deleted

    Unsecured Database Exposed on Web - Then Deleted

    David Finn contributes to this article where he discusses benevolent bots and building security and privacy into the design process for software vendors.

    Read More
  • loading
    Loading More...