Social Engineering & Phishing

News, Tips and Best Practices on Avoiding and Preventing Attacks

  • Take commonsense approach to cybersecurity for healthcare plan

    Take commonsense approach to cybersecurity for healthcare plan

    Read More
  • Deception technology applied to pharma cybersecurity

    Deception technology applied to pharma cybersecurity

    Read More
  • Improving Readiness: Meeting Cyber Threats | 2018 Report

    Improving Readiness: Meeting Cyber Threats | 2018 Report

    Our report aggregated data from assessments performed in 2017 at hundreds of healthcare organizations across the nation to reveal an average 45 percent conformance with NIST CSF.

    Read More
  • Cybersecurity Services

    Cybersecurity Services

    CynergisTek provides a large selection of cybersecurity services that can be offered as a standalone engagement or as part of a managed service designed to fit your needs.

    Read More
  • Learn More About Our Phishing Assessments

    Learn More
  • Learn What We Found After Assessing Hundreds of Healthcare Organizations' Conformance with NIST CSF

    Learn More
  • How to Prepare for Phishing Attacks

    How to Prepare for Phishing Attacks

    Understand the steps necessary to determine if your employees have the ability to recognize a phishing attack and how to be prepared for one.

    Read More
  • Don't Get Hooked by a Phish56:00

    Don't Get Hooked by a Phish

    Watch this webinar to identify the risks posed to healthcare organizations by phishing attacks and learn proven strategies for mitigating that risk.

    Watch Video
  • Under Armour Reports Massive Breach of MyFitnessPal App

    Under Armour Reports Massive Breach of MyFitnessPal App

    Read More
  • What is the NH-ISAC 90-Day DMARC Challenge?

    What is the NH-ISAC 90-Day DMARC Challenge?

    Healthcare organizations are more vulnerable to phishing attacks as the average maturity of security controls and training is less than that of other industries, such as banking. Successful...

    Read More
  • Ward off insider healthcare security threats with this tech

    Ward off insider healthcare security threats with this tech

    Read More
  • Myth busted: Policies and training will not automatically fix security issues

    Myth busted: Policies and training will not automatically fix security issues

    Read More
  • Anthem Breach Settlement 1 Step Closer to Final

    Anthem Breach Settlement 1 Step Closer to Final

    Read More
  • Improving Cybersecurity in Healthcare

    Improving Cybersecurity in Healthcare

    Read More
  • Best Practices for Preventing Phishing Attacks, Data Breaches

    Best Practices for Preventing Phishing Attacks, Data Breaches

    Read More
  • OCR Alert: Phishing Email Disguised as an Official OCR Audit Communication

    OCR Alert: Phishing Email Disguised as an Official OCR Audit Communication

    The Office for Civil Rights (OCR) sent a notice that warns of a phishing email scam. The email is for an audit notification and appears to be legitimate at first glance, as it is on an HHS...

    Read More
  • 2016 HIMSS Cybersecurity Survey Results

    2016 HIMSS Cybersecurity Survey Results

    Our infographic highlights 2016 HIMSS Cybersecurity Survey data, including organizations' breach history, threat concerns and security preparedness.

    Read More
  • 2015 Healthcare Privacy & Security Trends & Challenges

    2015 Healthcare Privacy & Security Trends & Challenges

    We created an infographic highlighting some of the trends & challenges from 2015, including the fact that hackers accessed over 100 million health records.

    Read More
  • The State of Phishing

    The State of Phishing

    Our infographic illustrates the impact of phishing based on both industry and our own data.

    Read More
  • Don’t Become a Victim of a Phishing Scam

    Don’t Become a Victim of a Phishing Scam

    Learn How to Recognize a Well Crafted Phish Phishing Awareness Attackers engage with you through your email inbox, and unless you pay close attention, you can become a victim to their masquerade....

    Read More
  • loading
    Loading More...