Questions? Talk to a Real Person via our Live Chat
By Gil Vidals, , HIPAA Blog, Resources

Identity Management

Many organizations have mission-critical systems that contain sensitive information, such as protected health information (PHI) or personally identifiable information (PII). If those mission-critical systems are breached by hackers, confidential PHI or PII may be extracted, negatively impacting the company’s welfare, operations, and customers they serve. The enforcement of strong identity (ID) management on a system-wide... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

What is HTTPS and How Do You Enable It?

HTTP VS HTTPS One of the easiest ways to protect the data of those who visit your website is by enabling HTTPS. HTTP, or Hypertext Transfer Protocol, is what web browsers use to communicate with web servers to display information; this traffic, however, is vulnerable to interception and “sniffing.” HTTPS, on the other hand, takes... Continue reading
Use Kali Linux to Defend Against System Vulnerabilities
By Gil Vidals, , HIPAA Blog, Resources

Use Kali Linux to Defend Against System Vulnerabilities

Securing our digital world involves utilizing the best offensive, cybersecurity penetration measures to test each environment’s security. Some of the finest tools available for this “ethical hacking” process are those offered through Kali Linux. Kali Linux is an open-source, Debian-derived distribution available to download and install through Windows and Linux. It is developed and maintained... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

3 Basic Steps for Securing WordPress

WordPress is the world’s most popular open-source content management system (CMS). As such, it is also the most frequently attacked CMS. It is vital, therefore, to understand how to make your WordPress site more secure. Keeping in mind the following 3 concepts will go a long way toward meeting that goal. Secure WP Access The... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

How to obtain CISSP Status

As an organization that focuses on managed security, HIPAA Vault is often asked how to enter the cybersecurity field and become an IT Security Expert. As an aide to those interested in this field of study, a CISSP certification may be helpful for you. Here is a guide to help you get your CISSP: Pursuing... Continue reading
DoS Attacks Threaten Organizations Around the World
By Gil Vidals, , HIPAA Blog, Resources

DoS Attacks Threaten Organizations Around the World

Denial-of-Service (DoS) attacks are an especially common form of cyberattack, intended to overload a target’s system and resources by sending enormous amounts of traffic. This type of volumetric attack typically utilizes zombie hosts, or computers infected with botnets to flood networks or applications with requests and traffic. The primary hacker’s IP is difficult to track... Continue reading
Skip to content