Tracking pixels are those tiny, invisible beacons that companies like Google and Facebook use to capture information about what you are doing, send it back to the mother ship, aggregate it with other data and then use it, mostly, for advertising purposes. Of course it can be used for many other purposes as well. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Spanish public entity Consorci Sanitari Integral (CSI) is a Barcelona-based hospital system that treats more than a million patients a year and has more than 3,000 physicians and staff. They detected a ransomware attack last Friday. Here is the remarkable news – they were able to recover in three days. They say this is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Five Reasons to Replace Your Old Router Your router is the gateway to your entire network – every single device in your home or office. It also is your security sentinel. The problem is that vendors, especially at the low end )meaning routers that cost less than, say, a few hundred bucks each), don’t want […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Why PREVENTING Ransomware is the Only Option Patients of Methodist McKinney Hospital and two of its surgery centers are preparing for their data to be sold on the dark web. Healthcare is a prime target for hackers for a number of reasons. The hospital decided not to pay the ransom for 360 gigabytes of stolen […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I guess HHS wants to be cool, so rather than having a press conference where people can ask embarrassing questions, they are going to release the proposed changes via a prerecorded video – sometime this summer. These new rules will apply to covered entities (like doctors) and business associates (like IT providers). Part of what […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This should make you feel better. Especially under the current situation. Palo Alto Networks Unit 42, an extremely well known and well respected group of security researchers, tested 200,000 network connected infusion pumps used in medical facilities. 75% of the devices tested had security vulnerabilities that would allow hackers to exploit them. The purpose of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]