Questions? Talk to a Real Person via our Live Chat
By Gil Vidals, , HIPAA Blog, Resources

What is HTTPS and How Do You Enable It?

HTTP VS HTTPS One of the easiest ways to protect the data of those who visit your website is by enabling HTTPS. HTTP, or Hypertext Transfer Protocol, is what web browsers use to communicate with web servers to display information; this traffic, however, is vulnerable to interception and “sniffing.” HTTPS, on the other hand, takes... Continue reading
Use Kali Linux to Defend Against System Vulnerabilities
By Gil Vidals, , HIPAA Blog, Resources

Use Kali Linux to Defend Against System Vulnerabilities

Securing our digital world involves utilizing the best offensive, cybersecurity penetration measures to test each environment’s security. Some of the finest tools available for this “ethical hacking” process are those offered through Kali Linux. Kali Linux is an open-source, Debian-derived distribution available to download and install through Windows and Linux. It is developed and maintained... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

3 Basic Steps for Securing WordPress

WordPress is the world’s most popular open-source content management system (CMS). As such, it is also the most frequently attacked CMS. It is vital, therefore, to understand how to make your WordPress site more secure. Keeping in mind the following 3 concepts will go a long way toward meeting that goal. Secure WP Access The... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

How to obtain CISSP Status

As an organization that focuses on managed security, HIPAA Vault is often asked how to enter the cybersecurity field and become an IT Security Expert. As an aide to those interested in this field of study, a CISSP certification may be helpful for you. Here is a guide to help you get your CISSP: Pursuing... Continue reading
DoS Attacks Threaten Organizations Around the World
By Gil Vidals, , HIPAA Blog, Resources

DoS Attacks Threaten Organizations Around the World

Denial-of-Service (DoS) attacks are an especially common form of cyberattack, intended to overload a target’s system and resources by sending enormous amounts of traffic. This type of volumetric attack typically utilizes zombie hosts, or computers infected with botnets to flood networks or applications with requests and traffic. The primary hacker’s IP is difficult to track... Continue reading
Creating a Strong Password to Protect Your Accounts
By Gil Vidals, , HIPAA Blog, Resources

Creating a Strong Password to Protect Your Accounts

“Password strength” is a measure of a password’s ability to resist brute-force attacks. The longer, more complex, and more unpredictable a password, the greater its password strength. Unfortunately, weak passwords are one of the most common and overlooked causes of system breaches. For this reason, passwords must be sufficiently strong to keep vital systems from... Continue reading
Skip to content