5 Top Cybersecurity Threats: Attacks on Connected Medical Devices

Our last focus in this series, based on the recent campaign from HHS' 405(d) Task Group is Attacks on Connected Medical Devices. The information on these flyers we are sharing with you was pulled directly from the Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients (HICP) publication.

5 Top Cybersecurity Threats: Insider, Accidental or Intentional Data Loss

As we mentioned in our first blog post of this series, HHS' 405(d) Task Group, with which Fulcrum Group is associated, has detailed and created flyers for 5 Top Cybersecurity Threats and we're sharing them with you throughout this month, along with great tips on how to mitigate!  Although these particular tips and flyers are geared around a healthcare environment, the recommendations and security strategies mentioned fall under standard cybersecurity best practices for any organization.

April 13, 2021 is Identity Management Day!

Recent research reveals that 79% of organizations have experienced an identity-related security breach in the last two years, and 99% believe their identity-related breaches were preventable. According to the 2020 Verizon Data Breach Investigations Report, as many as 81% of hacking-related breaches leverage weak, stolen, or otherwise compromised passwords.

5 Top Cybersecurity Threats: Ransomware Attacks

As we mentioned in our first blog post of this series, HHS' 405(d) Task Group, with which Fulcrum Group is associated, has detailed and created flyers for 5 Top Cybersecurity Threats and we're sharing them with you throughout this month, along with great tips on how to mitigate!  Although these particular tips and flyers are geared around a healthcare environment, the recommendations and security strategies mentioned fall under standard cybersecurity best practices for any organization.

5 Top Cybersecurity Threats: Email Phishing Attacks

March 31st, 2021

The HHS' 405(d) Task Group, with which Fulcrum Group is associated, was created to enhance cybersecurity and align industry approaches by developing a common set of voluntary, consensus-based, and industry-led guidelines, practices, methodologies, procedures, and processes that healthcare organizations can use to enhance cybersecurity.

Business & IT Lessons From The Covid-19 Pandemic

January 22nd, 2021

It’s safe to say that no business owner was totally prepared for the massive impact of Covid-19 on a wide range of business functions. It has now been almost a year since the pandemic caused businesses to lock down and send employees to work from home.

Ransomware – Before, During & After

January 14th, 2021

Before During and After Ransomware attacks

We all have heard of one of the most popular cyberattacks used in today’s business environment – ransomware. What type of attack it is, how it is obtained, how to get it off your machines if you’re attacked, and how to prevent it from happening to your organization – we’ve got answers for you! Watch our quick video here, or see our Q & A below.

Employees Most Susceptible to Phishing Attacks

January 13th, 2021

We might be prone to considering breaches caused primarily by cybercriminals hacking corporate networks. But data show - especially in the case of phishing attacks - are most often facilitated unknowingly by employees or insiders. In fact, the most recent Verizon Data Breach Investigations Report (DBIR) revealed that 30 percent of breaches are caused by an internal actor.

5 Ways you can benefit from business dashboards

December 28th, 2020

Data dashboards have become increasingly popular for businesses over the past few years. They are a great data visualization tool that gives you an overview of how your business is performing, catering to a wide variety of users, from marketing staff to project managers. Let’s take a look at how dashboards can support your business […]