Joe Lavelle of IntrepidNOW interviews Mac McMillan in this podcast, during which they discuss topics such as CynergisTek's growth, the rise of ransomware, strategies for mitigating risk and future security threats.
Using a Battering RAM to Hack
Most corporate systems, whether end-user systems or core servers, are guarded by various malicious software...
Other content in this Stream
Free Privacy and Security Incident Response Workshop in Philadelphia
We invite you to attend our free Privacy and Security Incident Response Workshop on Wednesday, November 14th in Philadelphia.
Free Privacy and Security Incident Response Workshop in Oklahoma City
We invite you to attend our free Privacy and Security Incident Response Workshop on Thursday, November 8th in Oklahoma City.
Free Privacy and Security Incident Response Workshop in Cincinnati
We invite you to attend our free Privacy and Security Incident Response Workshop on Thursday, October 25th in Cincinnati, Ohio.
Lunch & Learn: Think Your Network is Safe? Check All of Your Endpoints
Join HP and CynergisTek on October 24th to discuss how attackers are utilizing endpoint devices in new ways to compromise a network and how you may be found noncompliant.
Free Privacy and Security Incident Response Workshop in Tampa
We invite you to attend our free Privacy and Security Incident Response Workshop on Thursday, October 18th in Tampa.
Cybersecurity: Innovating staff buy-in and avoiding silver bullet tools
Security’s Greatest Enemy: Endpoints Disguised as ‘Stuff’
Ohio Creates Incentives to Proactively Adopt Cybersecurity Programs
A new Ohio law, the Data Protection Act, incentivizes businesses and not-for-profit organizations that proactively put into place cybersecurity programs to safeguard electronic information...
Healthcare Cybersecurity: Helping the Little Guy
Five Best Practices to Improve Your Third-Party Risk Management Program
CynergisTek's Senior Director, Security Services Operations David Rauschendorfer recently wrote a blog post describing several steps healthcare organizations should take to manage potential third-part
WHA Emergency Prep Conference: Cybersecurity in Health Care, October 23
5 Pitfalls to Avoid When Considering Security Staff Benchmarks
Device Makers Combating Cyber Risks to Patient Health
Records Snooping Alleged in Tragic Death of Toddler
Protecting Patient Information from Increased Cybersecurity Threats
Best Practices for HIPAA Compliance
Incident Response Planning: Paying NOT to Play
If you’re reading this, I probably don’t need to tell you that an incident response plan is the best way to prepare for that information security or other cyber incident – from attack, to...
Healthcare Technology Executive On Getting More Women Involved In The Cybersecurity Field
HHS OIG Finds Security Flaws in Maryland's Medicaid System
McAfee threat research team uncovers healthcare security risks