Cyber security news & events blog
Check out the latest trends, events, and stories relating to cyber security and privacy.
Email Security vs. Email Encryption What’s the Difference?
First Off, You Need Better Email Security!Protecting your home, or your finances from criminals with a secure bank account or home security system is a no-brainer, right? Well protecting your sensitive email messages should be no different. I mean you wouldn’t just...
How Criminals are Abusing AI to Fuel Cyber Attacks
The Rise of AI Has Raised Some Concerns.Visionary tech tycoons such as Elon Musk and Jeff Bezos continue to uncover and introduce innovative technology solutions that include interplanetary spaceflight, underground traffic systems, autonomous vehicles, multinational...
What is the Difference Between 2FA and MFA?
Webster’s dictionary defines the term “Security” as the state of being protected or safe from harm. In relation to online security nothing screams protection more than authentication, and what’s a better way to authenticate a person’s identity than requiring them to...
What is TLS Encryption?
Email services such as Gmail and Outlook continue to reign supreme in day-to-day business communication. While vanilla text exchange (unencrypted email) is by far the most popular in traditional email applications, this model's drawback leaves users vulnerable to data...
What is the HIPAA Security Rule?
Established in 2005, the HIPAA Security rule introduced national standards to safeguard electronic personal health information and ePHI. Any electronic health information that is distributed, accessed, created, stored, or maintained by a Covered Entity requires...
The HIPAA Privacy Rule
The HIPAA Privacy Rule was established in 1996 to protect persons’ healthcare-related records and data, by law, the HIPAA Privacy Rule applies only to Covered Entities. The Rule demands that individuals’ healthcare-related information must be protected and in no case...