How Remote Work is Driving the Adoption of More Secure Authentication Methods

Not least of all the challenges of this past year has been cybersecurity and how companies have had to evolve with the circumstances. Traditionally, we've all relied on common modes of authentication like passwords and phrases, of varying degrees of hackability, but the good news from this past year - remote working is making more businesses use more secure authentication methods.

Monday Warm Up: Malware or Rapper Name Quiz?

Let's get crackin' on this week with a little cybersecurity fun!  Do you know the difference between these rapper names and malware types (hint: grab your nearest middle-schooler for some help if needed)...?

Take the quiz and see how tech (and rap)  savvy you are.

Have you updated this iPhone Security Setting?

At Fulcrum Group, we feel it is important to regularly revisit security settings on all of your devices (not only work-related) as a general cybersecurity best practice. When your security is tight all over, you provide less opportunities all around for an inadvertent breach to occur.

5 Top Cybersecurity Threats: Attacks on Connected Medical Devices

Our last focus in this series, based on the recent campaign from HHS' 405(d) Task Group is Attacks on Connected Medical Devices. The information on these flyers we are sharing with you was pulled directly from the Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients (HICP) publication.

5 Top Cybersecurity Threats: Insider, Accidental or Intentional Data Loss

As we mentioned in our first blog post of this series, HHS' 405(d) Task Group, with which Fulcrum Group is associated, has detailed and created flyers for 5 Top Cybersecurity Threats and we're sharing them with you throughout this month, along with great tips on how to mitigate!  Although these particular tips and flyers are geared around a healthcare environment, the recommendations and security strategies mentioned fall under standard cybersecurity best practices for any organization.

April 13, 2021 is Identity Management Day!

Recent research reveals that 79% of organizations have experienced an identity-related security breach in the last two years, and 99% believe their identity-related breaches were preventable. According to the 2020 Verizon Data Breach Investigations Report, as many as 81% of hacking-related breaches leverage weak, stolen, or otherwise compromised passwords.

5 Top Cybersecurity Threats: Ransomware Attacks

As we mentioned in our first blog post of this series, HHS' 405(d) Task Group, with which Fulcrum Group is associated, has detailed and created flyers for 5 Top Cybersecurity Threats and we're sharing them with you throughout this month, along with great tips on how to mitigate!  Although these particular tips and flyers are geared around a healthcare environment, the recommendations and security strategies mentioned fall under standard cybersecurity best practices for any organization.

5 Top Cybersecurity Threats: Email Phishing Attacks

March 31st, 2021

The HHS' 405(d) Task Group, with which Fulcrum Group is associated, was created to enhance cybersecurity and align industry approaches by developing a common set of voluntary, consensus-based, and industry-led guidelines, practices, methodologies, procedures, and processes that healthcare organizations can use to enhance cybersecurity.