Questions? Talk to a Real Person via our Live Chat
By Gil Vidals, , HIPAA Blog, Resources

Blocking Foreign IPs

Cyber experts are noting a continuing increase in aggressive cyber attacks, with major players like China, Russia, Iran, and North Korea continuing to lead the way. The Ukraine and Brazil also represent growing threats in the cyber war. The motives behind these foreign IP attacks may include monetary gain, political agenda, or access to confidential... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

Session Hijacking

Session hijacking is the use of a valid computer session to gain access to otherwise prohibited parts of a computer system. Specifically, session hijacking refers to the use of a cookie to authenticate a user to a network that is breached. In this way, the attacker can use that cookie to trick the server into... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

Identity Management

Many organizations have mission-critical systems that contain sensitive information, such as protected health information (PHI) or personally identifiable information (PII). If those mission-critical systems are breached by hackers, confidential PHI or PII may be extracted, negatively impacting the company’s welfare, operations, and customers they serve. The enforcement of strong identity (ID) management on a system-wide... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

What is HTTPS and How Do You Enable It?

HTTP VS HTTPS One of the easiest ways to protect the data of those who visit your website is by enabling HTTPS. HTTP, or Hypertext Transfer Protocol, is what web browsers use to communicate with web servers to display information; this traffic, however, is vulnerable to interception and “sniffing.” HTTPS, on the other hand, takes... Continue reading
Use Kali Linux to Defend Against System Vulnerabilities
By Gil Vidals, , HIPAA Blog, Resources

Use Kali Linux to Defend Against System Vulnerabilities

Securing our digital world involves utilizing the best offensive, cybersecurity penetration measures to test each environment’s security. Some of the finest tools available for this “ethical hacking” process are those offered through Kali Linux. Kali Linux is an open-source, Debian-derived distribution available to download and install through Windows and Linux. It is developed and maintained... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

3 Basic Steps for Securing WordPress

WordPress is the world’s most popular open-source content management system (CMS). As such, it is also the most frequently attacked CMS. It is vital, therefore, to understand how to make your WordPress site more secure. Keeping in mind the following 3 concepts will go a long way toward meeting that goal. Secure WP Access The... Continue reading
Skip to content