article thumbnail

Cybersecurity Management Lessons from Healthcare Woes

eSecurity Planet

Ransomware attacks and data breaches make headlines when they shut down huge connected healthcare providers such as Ascension Healthcare or Change Healthcare. IT should never be the top expense for a healthcare organization. The costs, affected patients, and consequences continue to be tallied.

article thumbnail

Vulnerability Recap 6/10/24 – RCE Attacks in Major Platforms

eSecurity Planet

This lets threat actors change setups and access sensitive personal information of millions of Cox customers, such as MAC addresses and Wi-Fi passwords. They performed a follow-up security review to ensure that the vulnerability had not been exploited previously.

Malware 79
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

VulnRecap 2/26/24 – VMWare, Apple, ScreenConnect Face Risks

eSecurity Planet

Despite law enforcement efforts, LockBit attacks continue to target important infrastructure such as municipal governments and healthcare providers. ConnectWise ensures that cloud instances are secure. The fix: To prevent risks, urgently update on-premise servers to version 23.9.8.

Risk 113
article thumbnail

5 Linux malware families SMBs should protect themselves against

Malwarebytes

There’s no shortage of reasons why an SMB might use Linux to run their business: There are plenty of distros to choose from, it’s (generally) free, and perhaps above all — it’s secure. But unfortunately, there’s more to Linux security than just leaning back in your chair and sipping piña coladas. How it works.

Malware 101
article thumbnail

Public Cloud Security Explained: Everything You Need to Know

eSecurity Planet

Authentication guarantees that users are who they say they are, typically through usernames and passwords or multi-factor authentication (MFA). Firewalls and Network Security Firewalls serve as a barrier between cloud resources and external networks in a public cloud environment. Many firms are subject to industry-specific rules (e.g.,

article thumbnail

Cloud Security Fundamentals: Understanding the Basics

eSecurity Planet

To improve security and prevent unwanted access, best practices include limiting access to authorized users, enforcing strong password restrictions, and utilizing multi-factor authentication (MFA). Secure your storage methods: Encrypt and hash passwords and other authentication data to ensure their security.

article thumbnail

Cybersecurity Awareness Month: The value of cyber hygiene in protecting your business from potential ransomware

Thales Cloud Protection & Licensing

Attackers are also targeting critical sectors like education and healthcare. Over 500 healthcare providers suffered ransomware attacks in 2020 alone. For those critical systems where updates are challenging, make sure to add layered defenses and threat detection capabilities to further protect those systems from attack.