perm_phone_msgHAVE AN EMERGENCY? Call: (40) 0765 279 019

Top Categories

Spotlight

todayApril 7, 2020

Cyber security + Whitepapers pMLrwRHGEC

WHY IS THE HEALTHCARE SYSTEM SO BAD AT CYBERSECURITY?

Imagine a doctor completely unaware of what they’re walking into triaging two patients: one in need of a hospital cardiac catheterization lab after an irregular electrocardiogram (EKG) reading, the other suffering from a stroke and needing a CT scan. All systems are down due to ransomware, so the physician working [...]


COVID-19 A CHALLENGE FOR REAL AND CYBERLIFE

Cyber security Gabriel Garban todayMarch 13, 2020 42

Background
share close

We live in an at least interesting period.

The Covid-19 outbreak has put another huge pressure on our already complicated economies and lives. But, we, in the cybersecurity industry, we know how dangerous the outbreaks are. Even if we’re talking about virtual space. And we know that the first measure in a cyberattack is the isolation of the infected system and of the critical ones. We see already a surge of the cyberattacks and we consider that the unscrupulous parties we’ll use the global real life situation to attack the weak systems. Let’s stay alert!

A useful warning from The Cybersecurity and Infrastructure Security Agency (CISA) of the USA here below:

– Avoid clicking on links in unsolicited emails and be wary of email attachments. See Using Caution with Email Attachments and Avoiding Social Engineering and Phishing Scams for more information.

– Use trusted sources—such as legitimate, government websites—for up-to-date, fact-based information about COVID-19.

– Do not reveal personal or financial information in email, and do not respond to email solicitations for this information.

– Verify a charity’s authenticity before making donations.

Written by: Gabriel Garban

Rate it
Previous post

Similar posts

Cyber security pMLrwRHGEC / March 24, 2020

WHY SHOULD HOSPITALS AND HOSPITAL LEADERS CARE ABOUT CYBERSECURITY?

Many medical devices and other hospital assets now access the Internet – both in encrypted and unencrypted fashion. Billing systems use electronic transfers, medical devices upload vital statistics in real time to electronic health records, hospitals allow patients and visitors access to hospital WiFi, patients are being provided access to protected health information (PHI) via ...

Read more trending_flat

Post comments (0)

Leave a reply

Your email address will not be published. Required fields are marked *