Questions? Talk to a Real Person via our Live Chat
Use Kali Linux to Defend Against System Vulnerabilities
By Gil Vidals, , HIPAA Blog, Resources

Use Kali Linux to Defend Against System Vulnerabilities

Securing our digital world involves utilizing the best offensive, cybersecurity penetration measures to test each environment’s security. Some of the finest tools available for this “ethical hacking” process are those offered through Kali Linux. Kali Linux is an open-source, Debian-derived distribution available to download and install through Windows and Linux. It is developed and maintained... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

3 Basic Steps for Securing WordPress

WordPress is the world’s most popular open-source content management system (CMS). As such, it is also the most frequently attacked CMS. It is vital, therefore, to understand how to make your WordPress site more secure. Keeping in mind the following 3 concepts will go a long way toward meeting that goal. Secure WP Access The... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

How to obtain CISSP Status

As an organization that focuses on managed security, HIPAA Vault is often asked how to enter the cybersecurity field and become an IT Security Expert. As an aide to those interested in this field of study, a CISSP certification may be helpful for you. Here is a guide to help you get your CISSP: Pursuing... Continue reading
DoS Attacks Threaten Organizations Around the World
By Gil Vidals, , HIPAA Blog, Resources

DoS Attacks Threaten Organizations Around the World

Denial-of-Service (DoS) attacks are an especially common form of cyberattack, intended to overload a target’s system and resources by sending enormous amounts of traffic. This type of volumetric attack typically utilizes zombie hosts, or computers infected with botnets to flood networks or applications with requests and traffic. The primary hacker’s IP is difficult to track... Continue reading
Creating a Strong Password to Protect Your Accounts
By Gil Vidals, , HIPAA Blog, Resources

Creating a Strong Password to Protect Your Accounts

“Password strength” is a measure of a password’s ability to resist brute-force attacks. The longer, more complex, and more unpredictable a password, the greater its password strength. Unfortunately, weak passwords are one of the most common and overlooked causes of system breaches. For this reason, passwords must be sufficiently strong to keep vital systems from... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

Data Security and the Future of IoT

Connectivity seems to be all the rage these days, as the Internet of Things (IoT) continues to invade even our most common devices. From home thermostats to gas meters (with built-in, real-time leak-detection capability that can send alerts and potentially save lives), to our “AI assistants” Alexa and Google Home, IoT is rapidly changing the... Continue reading
Skip to content