<img src="https://secure.leadforensics.com/71120.png" style="display:none;">

Kalki Blog

Header_about.png

FBI Warns Healthcare Sector Vulnerable to Cyber Attacks

Posted by Kyle.Balicki on Jan 12, 2015 11:59:54 AM

Recently, the FBI has issued a warning to healthcare providers that their cyber security systems are lacking or not as good compared to other sectors which makes them highly vulnerable to attackers and hackers that are searching for personal medical records and health insurance data. Healthcare data is highly valuable to hackers in the black market as oppose to credit card numbers and data because it tends to contain details that can typically be used to access bank accounts or contain prescriptions for controlled substances. The overall demand for medical information is very strong on criminal marketplaces due in large part because it takes victims longer to realize the information has been stolen and report it, and because of the different ways the information can be used.

Read More

Topics: Breach, Risk assessment, Security technology, Cyber security

Overlooking is not an excuse....

Posted by Vikas.Bhatia on Dec 23, 2014 10:35:05 AM

When you receive alerts about cyber security breaches every morning i try to identify a common thread that can be use used by smaller businesses as a tool to reduce their exposure.

Read More

Topics: Breach, Risk assessment, small business, two factor authentication

Microsoft ends support for Windows XP

Posted by Stephen.Lawton on Apr 8, 2014 5:13:38 PM

We knew the day was coming. As the cliche goes, all good things must come to an end. So even with the extensions and pressure from the Windows XP community, today marks the day that Microsoft is discontinuing support for the venerable Windows XP operating system. So what does this mean for the millions of XP users still using the what at one time was Microsoft's most popular operating system ever? The answer is actually fairly simple and straightforward, although not necessarily what some companies will want to hear. The best way to ensure that your Windows XP systems are safe from newly discovered vulnerabilities is simply to disconnect them from the Internet.

Read More

Topics: Breach, Risk assessment, anti-malware, small business, Security technology, identity theft, Cyber security, Policies and Procedures

NIST unveils framework to strengthen cybersecurity

Posted by Vikas.Bhatia on Feb 13, 2014 6:22:15 PM

President Barack Obama issued Executive Order 13636 that calls for the strengthening of "Critical Infrastructure Cybersecurity" nearly a full year ago on Feb. 19, 2013. Yesterday, the National Institute of Standards and Technology announcingthe release of version 1 of a Cybersecurity Framework.

Read More

Topics: Security Credentials, Breach, Risk assessment, anti-malware, small business, Human Resources, Security technology, identity theft, Cyber security, Policies and Procedures

There's an app for that

Posted by Vikas.Bhatia on Jan 4, 2014 9:01:12 PM

Happy new year!

Read More

Topics: TechStartups, Breach, Risk assessment, small business, Cyber security

Security For All the Bloggers: Two-Factor Authentication

Posted by Kyle.Balicki on Dec 23, 2013 2:30:04 PM

We know that writing a blog is fun, and you can get information out or just talk to a set group of interested people about a topic you like. This is great and gives all of us an equal platform for our opinions. Although there always seems to be one thing that we forget, and that is Information Security regarding our blogging material. We see a lot of exploits for Wordpress on a regular basis. We have seen 6 exploits just in this month for Wordpress and associated plugins.

Read More

Topics: Security Credentials, Risk assessment, small business, identity theft, Cyber security, Policies and Procedures

"De-nile" is not just a river in Egypt....

Posted by Vikas.Bhatia on Oct 28, 2013 6:19:30 PM

A former co-worker of mine once mused, "De-nile is not just a river in Egypt," in response to a client who stated that the security problem we had identified didn't matter to him, his manager or in fact, the organization. This was despite the company in question was paying my former employer vast sums of money so that they didn't have to employ those with the expertise, namely us, directly.

Read More

Topics: Security Credentials, Risk assessment, small business, Security technology, identity theft, Cyber security

Bringing Down the Cost of a Data Breach

Posted by Stephen.Lawton on Oct 20, 2013 5:41:07 PM

Data breaches cost global business billions of dollars annually, but by internalizing the lessons of breaches past, future incidents need not be so costly. The Ponemon Institute’s fifth annual Cost of Data Breach Study: Global Analysis, which analyzes cost of data breaches globally, includes a pool of nearly 300 international businesses from 16 industries based in 9 countries. It offers critical insights into not only the cost of breach, but also the major factors that increase and decrease the related damage to an organization’s bottom line.

Read More

Topics: Risk assessment, Security technology, identity theft, Cyber security, Policies and Procedures

Human Resources and Information Security

Posted by Stephen.Lawton on Oct 15, 2013 1:10:58 PM

Every company faces this dilemma at some point: an employee must be discharged from their job where they had access to confidential corporate data. The reasons are as varied as the people themselves. Perhaps the discharge is due to corporate downsizing. Maybe the company is changing its focus and the employee’s job has become obsolete. The worst scenario occurs when the company finds an employee doing something nefarious, such as stealing information or accessing confidential data to which they have no business responsibility, such as looking up the personal contact information for a client that the employee wants to date.

Read More

Topics: BYOD, Security Credentials, Risk assessment, small business, Human Resources, Psychology, Cyber security, Policies and Procedures

Is My Network Safe?

Posted by Stephen.Lawton on Oct 8, 2013 10:28:50 PM

Microsoft Security Response Center has a list it calls the 10 Immutable Laws of Security. Generally speaking, the list is pretty good. Microsoft is clear that there are times when companies can lose control of their assets to an attacker and that this is often the biggest fear business owners’ face. However, as with any list, it is limited and misses one of the most important Laws of Cyber Security. We will get to that in a moment.

Read More

Topics: Risk assessment, small business, Security technology, identity theft, Cyber security