The eSentire Blog

Cybersecurity Strategy

3 M

How to prepare for cyberattacks in the healthcare industry

By this point, you know why the healthcare industry is a growing target for cyber-attacks, what the common…

READ NOW →

Cybersecurity Strategy

2 M

Cybersecurity and the Maginot Line

As a cybersecurity expert and a history nut (particularly when it comes to WWII), I tend to quickly see…

READ NOW →

Threat Intelligence

4 M

Cyberattack types plaguing the healthcare industry

The healthcare industry is an attractive target for several reasons, each of which has some influence on the type…

READ NOW →

Cybersecurity Strategy

4 M

Digital privacy: know your devices

Implementing strong privacy standards and being aware of privacy risks associated with image sharing and social…

READ NOW →

Threat Intelligence

3 M

What makes the healthcare industry so susceptible to cyberattacks?

With the number of recent data breaches and cyberattacks, the healthcare industry is no stranger to network…

READ NOW →

Ransomware

4 M

How can you fight ransomware? Solutions to 11 common ransomware failure points

Ransomware is an increasingly appealing cyberattack method. Compared to traditional methods, ransomware typically…

READ NOW →

Cloud Protection

4 M

Maintaining privacy and security on the cloud

On January 4th the marketing firm Octly discovered that, due to a misconfiguration in their Amazon Web Services…

READ NOW →

Sensitive Data Protection

5 M

AIMA helps ensure you're prepared for GDPR

The General Data Protection Regulation (GDPR) comes into effect on May 25th, 2018 – a mere three months from now.…

READ NOW →

Regulatory Compliance

7 M

Second ABA cybersecurity handbook reflects the need for greater awareness

As 2017 came to a close, the American Bar Association opened the next chapter in cybersecurity awareness with the…

READ NOW →

Cybersecurity Strategy

5 M

Balancing digital privacy and connectedness on social media

The use of social media has become prolific for both private users and organizations. Threat actors have not been…

READ NOW →

Regulatory Compliance

3 M

SEC cybersecurity guidance changes are coming

The U.S. Securities and Exchange Commission (SEC) announced plans to update its 6-year-old cybersecurity guidance…

READ NOW →

Threat Intelligence

3 M

EXIF data: a picture really is worth a thousand words

As technology continues to make the world more connected, privacy on the web is a growing concern. New innovations…

READ NOW →
Page
of 47