Phishing attacks on healthcare targets have been increasing, as the demand for healthcare information and the opportunity afforded to cybercriminals by an overstressed healthcare system creates fresh opportunities.
Hackers access South Country Health Alliance database, exposing 60,000 patients’ personal data
Hackers access Ubiquiti Network’s database
Hacking can come from many directions, but one common source is credential compromise. By adding strong access point protection, companies can add extra security against hackers like this.
Ransomware attack at Taylor Made Diagnostics exposes 3,000 patients’ data
Ransomware is almost always the result of a successful phishing attack. It’s an expensive nightmare for any business, especially one in the healthcare sector.
Hackers gain access to 10 million Parler users’ membership-restricted content, including deleted posts.
Data like this often makes its way to the Dark Web, enabling it to be used to power cybercrime like phishing and credential compromise.
5 Crucial steps when migrating UC to the cloud
Moving your business’s unified communications (UC) systems to the cloud offers many perks, including augmented security and scalability. You must, however, plan the migration carefully if you want to enjoy the move’s full benefits and avoid the possible risks that come with it.