Articles

Beginners Guide – Securing Legacy Devices

All hospitals and medical facilities have devices that store patient data. On August 21, 1996, the Healthcare Insurance Portability and Accountability Act (HIPAA) was signed into law, and by that time, millions of devices were installed and active. It was not until twenty years after HIPPA came to be that manufacturers began to address data vulnerabilities in their medical devices…. Read More

Data sharing, collection, and personal privacy concerns

The security risks created by COVID-19 continue to abound.  Applications have proliferated in the wild, offering concerned people the chance to test themselves for Coronavirus.  Now, I haven’t used any of these apps, I don’t know how reliable they are, but the point is they are being used.  People are submitting copious amounts of data… Read More

COVID risks for remote working and small businesses

Amid the financial strains small businesses are enduring throughout the COVID-19 situation, a new data breach has arisen from attempts to provide relief.  Unfortunately, it appears that in their haste to process relief loans, the US Small Business Administration (SBA) developed an application without sufficient protection.  Hence the breach.  Almost 8,000 people had their personal… Read More

Can Zoom’s new security initiatives win back users?

Before the outbreak of COVID-19, I can’t help but wonder how widely known Zoom was.  I had certainly never heard of it, but everyone seems to be using the service these days.  With fame, however, comes the spotlight and scrutiny.  If the company hadn’t been prioritizing their security, this Zoom boom is certainly making them… Read More

About that San Francisco Airport breach

Last week we covered security for travel by sea, this week we take a look at the sky.  Not that air travel is as prominent right now as it usually is, but don’t expect that to deter cyber criminals.  Airports are still a massive trove of personal information, and hackers are exploiting the COVID chaos… Read More

Phishing schemes and cruise line breaches

With industries around the world struggling to cope with COVID-19, and many smaller businesses especially hurting financially, it is crucial to avoid falling prey to cyber criminals and further disruption.  Phishing schemes, and not just COVID-related ones, continue to be an insidious way to exploit people’s trust or fears for the phishers’ own purposes. Phishing… Read More

Statement on COVID-19

To our NetLib Security community, COVID-19 has impacted global civilization in unprecedented ways. Our thoughts go out to everyone who has been personally affected by Coronavirus. People’s health and well-being is always of the utmost importance, and that is especially true now. We want you to know that we continue to attentively monitor the situation… Read More

What are the best COVID-19 cybersecurity tips?

Looking for tips on how to approach cybersecurity during this pandemic?  Let’s explore a few of the most necessary steps.  After all, by now the impact of COVID-19 has likely made its way to your organization, and like countless others, your employees are now working remotely.  Perhaps you have a minimal skeleton crew still on… Read More

Healthcare providers and COVID security incidents

I’ve heard on the grapevine that there are hackers out there pledging not to target healthcare institutions for the duration of this global COVID-19 pandemic.  I guess it’s only a small number in this camp, as cyber attacks against the industry have pretty much continued unabated.  Hospitals and providers remain the targets of constant attacks,… Read More

COVID-19 creates new cybersecurity concerns

It certainly seems like civilization has come to a halt under the assault of the coronavirus, but one area that hasn’t stopped is cybercrime.  One virus breeds another. In fact, cyber criminals are, not surprisingly, taking advantage of the global situation and people’s concerns for their own ends.  According to Kaspersky, phishing schemes and malware… Read More

Top