Login 

Call Us Now:

Weston Technology Solutions Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Subscribe to this list via RSS Blog posts tagged in Security

New Malware Detection At Record High

Posted by on in Security

hipaaIn headlines that shouldn’t surprise anybody, HIPAA Journal reports that malware detections in 2017 were at a record high, but healthcare is the most target industry:

Throughout 2017, the volume of new malware samples detected by McAfee Labs has been steadily rising each quarter, reaching a record high in Q3 when 57.6 million new malware samples were detected. On average, in Q3 a new malware sample was detected every quarter of a second.

In the United States, the healthcare industry continues to be the most targeted vertical, which along with the public sector accounted for more than 40% of total security incidents in Q3. In Q3, account hijacking was the main attack vector, followed by leaks, malware, DDoS, and other targeted attacks.

There were similar findings from the recent HIMSS Analytics/Mimecast survey which showed email related phishing attacks were the greatest cause of concern among healthcare IT professionals, with email the leading attack vector.

If you’re a CompleteCare client, you are about as well-protected as you can get from Malware and other security threats. Contact us today to learn more about our CompleteCare program and how it can protect your company from the latest threats to your business and your bottom line. 

Meltdown and Spectre Alert

Posted by on in Alerts

It seems we are sending these emails much too often these days, but yet another set of vulnerabilities have been found affecting basically every computer out there from Windows to Apple to Linux, as these particular vulnerabilities target the CPU or “brain” of your computer. These vulnerabilities have been reported in the mainstream media as “Meltdown” and “Spectre”

Microsoft released patches for Meltdown yesterday. We are in the process of rolling these out to our internal systems as we speak. If all goes well with our systems we will be rolling out the patches to all of our CompleteCare or other managed patching clients in the next couple of days.

As for Spectre, this one is a hardware vulnerability which is a lot harder to fix than a software patch, we await further information from Intel and other CPU manufacturers on how they will be addressing this issue and we will let you know more as further information becomes available.

Here are a couple of articles if you would like to know more:
https://www.pcworld.com/article/3245606/security/intel-x86-cpu-kernel-bug-faq-how-it-affects-pc-mac.html
https://www.msn.com/en-us/news/technology/security-flaws-put-virtually-all-phones-computers-at-risk/ar-BBHQ0UL?li=BBnbcA1

More technical details about the vulnerability can be found at https://spectreattack.com .

This is yet another reminder to be extremely vigilant about what links you click on, in social media and in banner ads on websites especially.

Even if you get an email with a link or attachment from someone that you know, if you were not expecting it, contact that person and make sure it was sent by them. Many of these attacks utilize software that will attempt to impersonate an email user and send an email to everyone in their contact list.

As always thanks for choosing Weston and Happy New Year!

Eric Spinney
Service Manager
Weston Technology Solutions

Tagged in: Hardware Security

Keep an Eye Out for Phishing Attacks

Posted by on in Security

Malicious emails are on the rise. According to the recent reports from ProofPoint, there was a 85% rise in malicious emails last quarter compared to Q2, along with a 600% rise in phishing attacks using malicious URLs. Compared to 2016, malicious URL attacks have risen a whopping 2200%.

So what can you do to protect yourself from phishing scams? You can follow these tips, which we published a couple years ago, but they still hold true.

Tagged in: Email Security Spam Virus

Cyber Threat Protection As a CompleteCare client, you can rest assured that we are doing everything we can to protect your network from security threats and problematic malware. We were asked by a client recently what we do to help protect them from cyber threats, so we figured we’d share a bit of our multi-layered approach here (these are the major items but not the only items).

hipaaAnother story that is becoming all-too-common. From HIPAA Journal: “Lost Laptop Sees PHI of 3,725 Veterans Exposed.”

What is the moral of this story for your health clinic?

  1. Properly Decommission Computers: Any device, when it’s taken out of production and had any sort of access to PHI needs to be completely wiped and properly decommissioned. That means doing a thorough scrubbing or destruction of the data on the hard drive of the computer. Refer to 45 CFR 164.310(d)(2)(i) and 45 CFR 164.310(d)(2)(ii) for more information.
  2. Encrypt All laptops: The data on all laptops should be encrypted at all times as it’s your Get Out Of Jail Free card. If a laptop is lost with properly documented fully encrypted data, there is no way for it to be recovered and it does not have to be reported as a breach.

Need help with your technology and HIPAA? Call us today to learn about our HIPAA services including disk encryption and annual risk assessments