Questions? Talk to a Real Person via our Live Chat
By Gil Vidals, , HIPAA Blog, Resources

Top 3 Website Security Vulnerabilities

When performing a scan of your system servers, applications, and network devices, it’s not uncommon to see certain, predictable vulnerabilities showing up in the results. As each vulnerability represents a potential “weak spot,” or opening for attackers to penetrate and compromise your system, it’s important to be aware of them. The following represent the 3... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

Blocking Foreign IPs

Cyber experts are noting a continuing increase in aggressive cyber attacks, with major players like China, Russia, Iran, and North Korea continuing to lead the way. The Ukraine and Brazil also represent growing threats in the cyber war. The motives behind these foreign IP attacks may include monetary gain, political agenda, or access to confidential... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

Session Hijacking

Session hijacking is the use of a valid computer session to gain access to otherwise prohibited parts of a computer system. Specifically, session hijacking refers to the use of a cookie to authenticate a user to a network that is breached. In this way, the attacker can use that cookie to trick the server into... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

Identity Management

Many organizations have mission-critical systems that contain sensitive information, such as protected health information (PHI) or personally identifiable information (PII). If those mission-critical systems are breached by hackers, confidential PHI or PII may be extracted, negatively impacting the company’s welfare, operations, and customers they serve. The enforcement of strong identity (ID) management on a system-wide... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

What is HTTPS and How Do You Enable It?

HTTP VS HTTPS One of the easiest ways to protect the data of those who visit your website is by enabling HTTPS. HTTP, or Hypertext Transfer Protocol, is what web browsers use to communicate with web servers to display information; this traffic, however, is vulnerable to interception and “sniffing.” HTTPS, on the other hand, takes... Continue reading
Skip to content