More Than 20 Serious Vulnerabilities in OpenEMR Platform Patched
Aug09

More Than 20 Serious Vulnerabilities in OpenEMR Platform Patched

OpenEMR is an open-source electronic health record management system that is used by many thousands of healthcare providers around the world. It is the leading free-to-use electronic medical record platform and is extremely popular. Around 5,000 physician offices and small healthcare providers in the United States are understood to be using OpenEMR and more than 15,000 healthcare facilities worldwide have installed the platform. Around 100 million patients have their health information stored in the database. Recently, the London-based computer research organization Project Insecurity uncovered a slew of vulnerabilities in the source code which could potentially be exploited to gain access to highly sensitive patient information, and potentially lead to the theft of all patients’ health information. The Project Insecurity team chose to investigate EMR and EHR systems due to the large number of healthcare data breaches that have been reported in recent years. OpenEMR was the natural place to start as it was the most widely used EMR system and with it being open-source, it was easy...

Read More
Vulnerabilities Discovered in Medtronic MyCareLink Patient Monitors and MiniMed Insulin Pumps
Aug08

Vulnerabilities Discovered in Medtronic MyCareLink Patient Monitors and MiniMed Insulin Pumps

An advisory has been issued by ICS-CERT about vulnerabilities in MedTronic MyCareLink Patient Monitors and the MiniMed 508 Insulin Pump. This is the second advisory to be issued about MyCareLink Patient Monitors in the past six weeks. In June, ICS-CERT issued a warning about the use of a hard-coded password (CVE-2018-8870) and an exposed dangerous method or function vulnerability (CVE-2018-8868). The latest vulnerabilities to be discovered are an insufficient verification of data authenticity flaw (CVE-2018-10626) and the storage of passwords in a recoverable format (CVE-2018-10622). The vulnerabilities are present in all versions of the Medtronic MyCareLink 24950 and 24952 Patient Monitors. If an attacker were to obtain per-product credentials from the monitor and the paired implanted cardiac device, it would be possible for invalid data to be uploaded to the Medtronic Carelink network due to insufficient verification of the authenticity of uploaded data. The vulnerability has been assigned a CVSS v3 score of 4.4 (medium severity). The way that passwords are stored could allow...

Read More
Cofense Develops New Phishing-Specific Security Orchestration, Automation and Response Platform
Jul30

Cofense Develops New Phishing-Specific Security Orchestration, Automation and Response Platform

Cofense has developed a new product which will soon be added to its portfolio of anti-phishing solutions for healthcare organizations and incorporated into its phishing-specific security orchestration, automation and response (SOAR) platform. The announcement comes at a time when the healthcare industry has been experiencing an uptick in phishing attacks. The past few months have seen a large number of healthcare organizations fall victims to phishing attacks that have resulted in cybercriminals gaining access to employee’s email accounts and the PHI contained therein. Perimeter security defenses can be enhanced to greatly reduce the number of malicious emails that reach employees’ inboxes, but even when multiple security solutions are deployed they will not block all phishing threats. Security awareness training is essential to reduce susceptibility to phishing attacks by conditioning employees to stop and think before clicking links in emails or opening questionable email attachments and to report suspicious emails to their security teams. However, security teams can struggle to...

Read More
TitanHQ Expands Executive Team with Appointment of Rocco Donnino as VP of Strategic Alliances
Jul04

TitanHQ Expands Executive Team with Appointment of Rocco Donnino as VP of Strategic Alliances

TitanHQ, the Galway, Ireland-based provider of spam filtering, web filtering, and email archiving solutions, has announced the appointment of Rocco Donnino to its executive team. TitanHQ has been experiencing impressive growth over the past three years and has doubled its staff to meet demand and provide support for its customers. To accommodate growth in the United States, TitanHQ has recently opened a new office in New York and has expanded its offices in Florida, now taking up all three floors of the Mazars Building. In the past 12 months, TitanHQ has formed new strategic partnerships with industry heavyweights such as Microsoft, Comcast, Datto, Kaseya, BitDefender, and ViaSat and now provides email and web security services to more than 7,500 businesses around the world. To help continue its impressive growth trajectory, TitanHQ has now appointed Rocco Donnino as its Executive Vice President of Strategic Alliances – a new position created to help ensure the continued expansion of the company’s strategic partnerships. Rocco Donnino has been charged with growing the firm’s...

Read More
Qcentive Controls AWS Costs & Enables Cloud Computing in Healthcare with ParkMyCloud
Jul02

Qcentive Controls AWS Costs & Enables Cloud Computing in Healthcare with ParkMyCloud

The Massachusetts-based healthcare startup Qcentive, the developer of a cloud-based platform that helps healthcare companies with the creation and management of value-based contracts, was one of the first companies authorized to move healthcare data to the cloud. The first-in-class transaction platform has been certified as HIPAA compliant and incorporates appropriate safeguards to ensure the confidentiality, integrity, and availability of ePHI. The company uploads patient and healthcare contract information to AWS, where the data are accessed by the company’s application. The platform helps its health plan clients and their value-based contracting providers analyze claims data and patient information such as emergency room visits and use the information to quickly calculate potential savings. While developing the platform, Qcentive uploaded large quantities of patient and claim data to AWS and created AWS resources as necessary, although as many companies discover, AWS costs can quickly mount up. Qcentive tried to find a way to keep its AWS costs under control, starting with...

Read More
Vulnerabilities Identified in Medtronic MyCareLink Heart Monitors
Jul02

Vulnerabilities Identified in Medtronic MyCareLink Heart Monitors

ICS-CERT has issued an advisory about two recently discovered vulnerabilities in Medtronic MyCareLink patient monitors. The devices are used by patients with implantable cardiac devices to transmit their heart rhythm data directly to their clinicians. While the devices have safeguards in place and transmit information over a secure Internet connection, the vulnerabilities could potentially be exploited by a malicious actor to gain privileged access to the operating system of the devices. The vulnerabilities – a hard-coded password vulnerability (CWE-259 / CVE-2018-8870) and an exposed dangerous method of function (CWE-749 / CVE-2018-8868) vulnerability – exist in all versions of 24950 and 24952 MyCareLink Monitors. The former has been assigned a CVSS v3 score of 6.4 and the latter a CVSS v3 score of 6.2. The vulnerabilities were discovered by security researcher Peter Morgan of Clever Security, who reported the issues to NCCCIC. Exploitation of the hard-coded password vulnerability would require physical access to the device. After removing the case, an individual could...

Read More
Acumera Partners with TitanHQ to Offer Web Filtering to Customers
Jun26

Acumera Partners with TitanHQ to Offer Web Filtering to Customers

The Galway, Ireland-based cybersecurity firm TitanHQ has announced the formation of a new partnership with the Austin, TX-based managed services provider Acumera. Acumera is a leading provider of managed network security services in the United States. Securing widely distributed networks consisting of hundreds or thousands of locations is one of the main strengths of Acumera, with the managed services provider able to meet the unique connectivity, operational, and data security challenges that these large networks create. The company offers network security, connectivity, and visibility services for a wide range of industry sectors. Acumera has been chosen by many healthcare provider networks who have chosen to outsource cybersecurity and provides network security services for drug stores, automated parking garages, and has secured the POS systems and networks of some of the best-known retailers in the United States, including 7-Eleven, Circle K, Subway, Valero service stations, Benetton, and Pluckers. One area where Acumera’s managed services required a boost was web filtering,...

Read More
Advisory Issued After 8 Vulnerabilities Discovered in Natus Xltek NeuroWorks Software
Jun21

Advisory Issued After 8 Vulnerabilities Discovered in Natus Xltek NeuroWorks Software

ICS-CERT has issued an advisory following the discovery of eight vulnerabilities in version 8 of Natus Xltek NeuroWorks software used in Natus Xltek EEG medical products. If the vulnerabilities are successfully exploited they could allow a malicious actor to crash a vulnerable device or trigger a buffer overflow condition that would allow remote code execution. All eight vulnerabilities have been assigned a CVSS v3 score above 7.0 and are rated high.  Three of the vulnerabilities – tracked as CVE-2017-2853, CVE-2017-2868, and CVE-2017-2869 – have been assigned a CVSS v3 base score of 10, the highest possible score. CVE-2017-2867 has been assigned a base score of 9.0, with the other four vulnerabilities – CVE-2017-2852, CVE-2017-2858, CVE-2017-2860, and CVE-2017-2861 – given a rating of 7.5. The vulnerabilities are a combination of stack-based buffer overflow and out-of-bounds read vulnerabilities. CVE-2017-2853 would allow an attacker to cause a buffer overflow by sending a specially crafted packet to an affected product while the product attempts to open a file requested by...

Read More
CSO Online Rates Cofense Triage One of Best Security Software Solutions of 2018
Jun15

CSO Online Rates Cofense Triage One of Best Security Software Solutions of 2018

Cofense Triage, the phishing incident response platform, has been included in CSO Online’s 2018 list of the best security software solutions of 2018. To produce the list, CSO Online conducted independent reviews of a wide range of software solutions. Strict review methodologies were used to select the best security products currently on the market. Each product was researched to find out how it worked, how the solution could be deployed in customer environments, the benefits it provided, and the major problems that the solution resolved. The review was based on the top technology areas for security identified by Gartner, which included cloud workload protection platforms, remote browsers, deception technologies, endpoint detection and response platforms, network traffic analysis solutions, managed detection and response services, microsegmentation solutions, cloud access security brokers, OSS security scanning services for DevSecOps, and container security. CSO Online tested all security solutions in a dedicated lab environment with each tested, where appropriate, against some of...

Read More
TitanHQ Integrates Web Security into Datto’s Networking Suite
Jun13

TitanHQ Integrates Web Security into Datto’s Networking Suite

TitanHQ, the leading provider of email and web security solutions for SMBs, has formed a strategic alliance with the networking giant Datto and will be providing its innovative cloud-based web filtering solution to Datto MSPs. Norwalk, CT-based Datto is primarily a data backup, disaster recovery, and business continuity service provider. The company’s mission is to provide SMBs with the highest quality enterprise-level technology to protect their businesses and networks. Datto achieves this through its managed service provider (MSP) partners, giving them access to software solutions to ensure their clients are well protected. The company was acquired by Vista Equity Partners in 2017 and merged with New York-based Autotask and now has offices in 21 locations in the United States, Canada, China, Denmark, Netherlands, Germany, Singapore, Australia, and the UK. The company employs more than 1,300 staff and is the world’s leading provider of MSP-delivered IT solutions. TitanHQ Integrates Web Filtering Solution into Datto’s Networking Range Galway-based TitanHQ is an award-winning...

Read More
More than 90% of Hospitals and Physicians Say Mobile Technology is Improving Patient Safety and Outcomes
Jun12

More than 90% of Hospitals and Physicians Say Mobile Technology is Improving Patient Safety and Outcomes

90% of hospitals and 94% of physicians have adopted mobile technology and say it is helping to improve patient safety and outcomes, according to a recent survey conducted by Black Book Research. The survey was conduced on 770 hospital-based users and 1,279 physician practices between Q4, 2017 and Q1, 2018. The survey revealed 96% of hospitals are planning on investing in a new clinical communications platform this year or have already adopted a new, comprehensive communications platform. 85% of surveyed hospitals and 83% of physician practices have already adopted a secure communication platform to improve communications between care teams, patients, and their families. Secure text messaging platform are fast becoming the number one choice due to the convenience of text messages, the security offered by the platforms, and the improvements they make to productivity and profitability. 98% of hospitals and 77% of physician practices said they have implemented secure, encrypted email and are using intrusion detection systems to ensure breaches are detected rapidly. Many providers of...

Read More
Apple Launches API for Developers to Allow EHR Data to be Used in Care Management Apps
Jun06

Apple Launches API for Developers to Allow EHR Data to be Used in Care Management Apps

Apple has launched a new application programming interface (API) for developers that will allow them to create health apps that incorporate patients’ EHR data. Patients who load their EHR data into the Apple Health Records app will be able to pass the information directly to third party apps. The move allows app developers to create a wide range of apps that can help patients manage their care.  The first apps that will be allowed to access EHR data, if permitted by the patient, should be available in the fall to coincide with the release of iOS 12. One such app that can be used in connection with EHR data through the Apple Health Records app is Medisafe. The Medisafe app will allow patients of participating health systems to download their prescriptions lists and set reminders when their medications need to be taken. The app will also alert them to any potentially harmful interactions between their medications. Apple suggests apps could be developed to help patients manage their medical conditions. Access to EHR data will allow those apps to provide more accurate and useful...

Read More
Cofense Triage Now Helping ADT Protect its Customers from Phishing Attacks
May16

Cofense Triage Now Helping ADT Protect its Customers from Phishing Attacks

Cofense has announced it has partnered with the monitored security and interactive business automation solution provider ADT. ADT provides cybersecurity solutions to enterprises and mid-sized companies throughout the United States and Canada. The firm’s managed detection and response services allow businesses to mitigate cyber threats in real-time before they lead to a data breach. Perimeter defenses only go so far. They will block the majority of cyber threats, although no solution is capable of preventing all phishing emails from reaching inboxes. It is therefore essential for organizations to have a solution in place to allow phishing attacks to be mitigated in real time. The partnership will see Cofense Triage incorporated into ADT’s unified platform for organizing, managing, and collecting cyber intelligence. Cofense Triage is the industry’s first phishing-specific automated incident response platform. The platform provides security teams with detailed information on phishing attacks in real-time, helping them separate attacks in progress from the background noise and...

Read More
Warnings Issued Over Vulnerable Medical Devices
May14

Warnings Issued Over Vulnerable Medical Devices

Warnings have been issued by the Department of Homeland Security’s (DHS) Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) about vulnerabilities in several medical devices manufactured by Silex Technology, GE Healthcare, and Phillips. If the vulnerabilities were to be exploited, an unauthorized individual could potentially take control of the devices. Phillips Brilliance CT Scanners In early May, Phillips alerted the National Cybersecurity and Communications Integration Center (NCCIC) about security vulnerabilities affecting its Brilliance CT scanners. Phillips has been working to remediate the vulnerabilities and has been working with DHS to alert users of its devices to help them reduce risk. There have been no reports received to suggest any of the vulnerabilities have been exploited in the wild. Three vulnerabilities have been discovered to affect the following scanners: Brilliance 64 version 2.6.2 and below Brilliance iCT versions 4.1.6 and below Brillance iCT SP versions 3.2.4 and below Brilliance CT Big Bore 2.3.5 and below See ICS-CERT advisory...

Read More
Cofense Expands Technology Alliance Program to Provide Organizations with Greater Visibility into Network Security
May09

Cofense Expands Technology Alliance Program to Provide Organizations with Greater Visibility into Network Security

Over the past 12 months, the anti-phishing solution provider Cofense has significantly expanded its Technology Alliance Program, increasing its partners by 50% and adding more than 10 new technical integrations in the past year. The purpose of the Technology Alliance Program is to allow partners to offer their customers a much more comprehensive solution to deal with the growing threat from phishing. Complimentary cybersecurity solution providers can concentrate on enhancing their own capabilities, while benefiting from the specialized anti-phishing technology developed by Cofense. By linking technologies together, customers of partners will be able to offer the detailed intelligence and phishing response capabilities of Cofense Triage and Cofense Intelligence. The solutions provide detailed information that can help companies make more effective decisions about the cyber threats facing their company. The integrations with technology partners also reduce the cost for customers, simplify deployments, improve efficiency, and help them optimize their cybersecurity investments. New...

Read More
Tristar Medical Group Discovers Solution That Reduced its AWS Costs by 60%
May09

Tristar Medical Group Discovers Solution That Reduced its AWS Costs by 60%

Healthcare organizations are increasingly turning to the cloud to meet their IT needs, but while there are many advantages to be gained from migrating applications, infrastructure, and datacenter operations to the cloud, managing cloud costs remains a major challenge. Many healthcare organizations choose AWS EC2 instances for their servers. While the platform meets their needs, the high cost of running AWS EC2 instances – or equivalent instances from other providers – is forcing many healthcare organizations to scale back their cloud migration plans. The cost of running AWS EC2 instances can be considerable. Tristar Medical Group, the largest privately-owned healthcare provider in Australia, runs facilities across the country, spread across multiple time zones. Its clinics need access to servers around the clock and cloud instances were left running 24/7. Tristar soon discovered its strategy was proving prohibitively expensive. While the needs of its clinics were being met, the cost of its virtual desktop infrastructure (VDI) solution was unsustainable. The rising OpEx costs...

Read More
TitanHQ’s WebTitan Now Available Through Kaseya IT Complete Suite
May04

TitanHQ’s WebTitan Now Available Through Kaseya IT Complete Suite

TitanHQ has announced its DNS-based web filtering solution, WebTitan, has now been integrated into Kaseya’s IT Complete platform. The integration allows MSPs serving the healthcare industry to offer their clients an additional layer of protection against web-based threats such as phishing, malware, and ransomware. Via Kaseya, managed service providers can access cybersecurity solutions from some of the biggest names in the industry, including Cisco, Dell, and Bitdefender. While the platform provides MSPs with a wide range of easy-to-deploy cybersecurity solutions, one notable absence was an MSP-friendly content filtering solution. “Security is a critical service that all MSPs must deliver. Adding WebTitan to our open ecosystem of partner solutions means our customers now have even greater access to best of breed technologies to meet the needs of their business,” said Frank Tisellano, Jr., Kaseya vice president product management and design. “With growing concerns over malware, ransomware and phishing as key threats to MSP customers, WebTitan adds a highly effective layer of...

Read More
FDA Issues Alert Over Vulnerabilities in Abbot Laboratories Defibrillators
Apr19

FDA Issues Alert Over Vulnerabilities in Abbot Laboratories Defibrillators

The U.S. Food and Drug Administration has issued an alert about certain Abbott Laboratories implantable cardiac devices that have cybersecurity vulnerabilities that could potentially be exploited to alter the functioning of the devices. Certain implantable cardiac defibrillators (ICDs) and cardiac resynchronization therapy defibrillators (CRT-Ds) are affected, including the Current, Promote, Fortify, Quadra, Unify, and Ellipse families of products. The flaws do not exist on pacemakers or cardiac resynchronization pacemakers (CRT-Ps). Exploitation of the vulnerabilities is possible using commercially available equipment that could be used to send commands to the devices via radio frequencies. For the vulnerabilities to be exploited, an attacker would need to be in relatively close proximity to the device. Were an attack to happen, it would be possible to alter the function of the devices and cause them to deliver inappropriate packing and shocks or cause the batteries to deplete prematurely. Exploitation of the vulnerabilities therefore has potential to cause harm to patients. The...

Read More
Cofense Enhances Security Awareness and Employee Conditioning Solutions
Apr07

Cofense Enhances Security Awareness and Employee Conditioning Solutions

Cofense has announced it has made several enhancements to its phishing training, simulation, and response platform to make it even easier for companies to improve their defenses against phishing attacks – The number one cybersecurity threat faced by organizations in the healthcare sector. While technological anti-phishing solutions can reduce the volume of malicious emails that are delivered to end users’ inboxes, some phishing emails will still be delivered. It is therefore essential – and a requirement of HIPAA – for employees to receive training to help them identify phishing threats. Research conducted by Cofense has shown that organizations can reduce susceptibility to phishing attacks by up to 95% through security awareness training, when training is reinforced with phishing simulations. The Cofense PhishMe training and phishing simulation platform helps organizations improve the security awareness of their employees and conditions them to respond appropriately when potentially malicious messages are received. In addition to regular additions to the library of training...

Read More
Cofense Reporter for Mobile Launched to Accelerate Reporting of Phishing Attacks
Apr05

Cofense Reporter for Mobile Launched to Accelerate Reporting of Phishing Attacks

Cofense Reporter, the phishing email reporting solution used on more than 11 million endpoints to report phishing attacks in progress, has now been released in a mobile-friendly format. The solution allows employees to report phishing attacks, regardless of the device used to check work emails. The HIPAA Security Rule requires covered entities to provide security awareness training to employees to help prevent the exposure or theft of protected health information. Training helps employees to recognize phishing threats before they lead to a data breach. Since phishing emails are likely to be sent to multiple employees, security teams need to act quickly when a phishing attack is identified. A solution that allows phishing emails to be reported by employees will help to increase the speed at which threats can be mitigated. Cofense’s solution – Cofense Reporter – allows employees to report phishing emails with a single click of the mouse. The emails are sent to security teams allowing all other instances of the email to be rapidly removed from employees’ inboxes. Phishing email...

Read More
Verizon PHI Breach Report Confirms Healthcare Has Major Problem with Insider Breaches
Apr03

Verizon PHI Breach Report Confirms Healthcare Has Major Problem with Insider Breaches

Verizon has released its annual Protected Health Information Breach Report which delves deep into the main causes of breaches, why they occur, the motivations of internal and external threat actors, and the main threats to the confidentiality, integrity, and availability of PHI. For the report, Verizon analyzed 1,368 healthcare data breaches and incidents where protected health information (PHI) was exposed but not necessarily compromised. The data came from 27 countries, although three quarters of the breached entities were based in the United States where there are stricter requirements for reporting PHI incidents. In contrast to all other industry sectors, the healthcare industry is unique as the biggest security threat comes from within. Insiders were responsible for almost 58% of all breaches with external actors confirmed as responsible for just 42% of incidents. The main reason for insider breaches is financial gain. PHI is stolen to commit identity theft, credit card fraud, insurance fraud, and tax fraud. Verizon determined that 48% of all internal incidents were conducted...

Read More
Palo Alto Networks Completes Acquisition of Evident.io
Mar26

Palo Alto Networks Completes Acquisition of Evident.io

Evident.io, a leader in the field of public cloud services infrastructure protection, has been acquired by Palo Alto Networks for $300 million in cash. Palo Alto Networks is already a leader in cloud security. The company has developed its VM-Series of virtualized next-gen firewalls which provide in line cloud security, Traps provides host-based protection, and API-based security covers public cloud services infrastructure. Evident.io is also a leader in the field of cloud security. The Evident Security Platform allows organizations to proactively manage cloud security risk, reduce the attack surface, and improve security posture. The platform continuously monitors Azure and AWS deployments, assesses security risks, and provides expert guidance on remediation. Palo Alto believes that the acquisition of a leader in the field of public cloud services infrastructure protection will enable the company to strengthen its position and extend its leadership in the field. Evident.io solutions will be integrated into the Palo Alto range and will allow customers to use a single approach to...

Read More
Is Liquid Web HIPAA Compliant?
Mar20

Is Liquid Web HIPAA Compliant?

Healthcare organizations searching for a hosting solution may identify Liquid Web as a potential vendor, but is Liquid Web HIPAA compliant? Can its cloud services be used by HIPAA-covered entities for hosting applications and projects that include electronic protected health information? Any healthcare organization that wants to use the cloud to host applications that use the protected health information (PHI) of patients must select a vendor whose service includes safeguards to ensure the confidentiality, integrity, and availability of ePHI that meet the requirements of the HIPAA Security Rule. Cloud service providers, including hosting companies, are classed as business associates since they potentially have access to their clients’ data. While many cloud service providers claim they do not access customers’ data, they are still classed as business associates. HIPAA-covered entities and their business associates must therefore enter into a business associate agreement with the service provider before any ePHI is uploaded to the cloud. Liquid Web Business Associate Agreements...

Read More
SafeDNS Partners with Internet Watch Foundation
Mar18

SafeDNS Partners with Internet Watch Foundation

The web filtering platform provider SafeDNS has been helping consumers and businesses control the content that can be accessed via their wired and wireless networks since 2013. SafeDNS is already a ‘Friendly WiFi’ accredited company and its solutions ensure minors can access the Internet safely and securely and avoid sexual content and other age-inappropriate websites. Now the Alexandria, VA-based firm has announced it has partnered with the Internet Watch Foundation (IWF), and through membership with the organization, has taken another step toward making the Internet a cleaner and safer place. The IWF is a not-for-profit organization committed to cleaning up the Internet and removing images and video content of child abuse, child pornography, and other criminally obscene website content. The organization searchers for images of child abuse and allows Internet users to anonymously report any websites, webpages, and forums where such images are hosted. The IWF plays a major role in taking down the content and helps to bring the perpetrators to justice. The IWF also maintains a Child...

Read More
NH-ISAC Partnership with Anomali Helps Accelerate Threat Detection and Information Sharing in Healthcare
Mar17

NH-ISAC Partnership with Anomali Helps Accelerate Threat Detection and Information Sharing in Healthcare

Anomali has partnered with the National Health Information Sharing and Analysis Center (NH-ISAC) and will be providing threat intelligence to healthcare organizations through NH-ISAC. Anomali will be providing NH-ISAC with the required tools and infrastructure to allow its members to collaborate and share threat intelligence with other members. Anomali will be providing up to date threat intelligence on new and current external threats specific to the healthcare industry allowing NH-ISAC members to take proactive steps to minimize risk. Anomali’s early warning system helps healthcare organizations respond to threats quickly when suspicious activity is detected on a network. NH-ISAC members include hospitals, health insurers, medical research institutions, pharma companies, ambulatory providers, medical device manufacturers and other healthcare stakeholders. NH-ISAC community members help each other use physical and cyber threat intelligence to inform security decisions and mitigate threats. The new collaboration between NH-ISAC and Anomali will help empower the healthcare community...

Read More
Organizations Adopting the Cloud for Data, Application and Services are Sacrificing Security
Mar15

Organizations Adopting the Cloud for Data, Application and Services are Sacrificing Security

Palo Alto Networks has released the findings of a new survey conducted on organizations in Europe and the Middle East that are actively adopting the cloud. The survey examined efforts to maintain cybersecurity across the entire organization as businesses start to utilize cloud environments to meet their data, application, and services needs. The survey has revealed the rush to the cloud has meant sacrificing security, with cloud environments not nearly as well protected as networks and endpoints. These shortcuts on security are leaving many organizations exposed to risk. Cybersecurity professionals in businesses that are actively adopting the cloud were polled and asked about the state of cybersecurity in their cloud and hybrid cloud environments. More than half of polled cybersecurity professionals– 54% – report misalignment between the cybersecurity department and the rest of the business on cloud and cybersecurity issues. While cybersecurity professionals believe security is a top priority for the public cloud, fewer than half of respondents believe current cybersecurity...

Read More
Is Google Calendar HIPAA Compliant?
Mar07

Is Google Calendar HIPAA Compliant?

Is Google Calendar HIPAA compliant? Can the time management and calendar scheduling service be used by healthcare organizations or would use of the service be considered a violation of HIPAA Rules? This post explores whether Google supports HIPAA compliance for the Google Calendar service.   Google Calendar was launched in 2006 and is part of Google’s G Suite of products and services. Google Calendar could potentially be used for scheduling appointments, which may require protected health information to be added. Uploading any protected health information to the cloud is not permitted by the HIPAA Privacy Rule unless certain HIPAA requirements have first been satisfied. A risk analysis must be conducted to assess potential risks to the confidentiality, integrity, and availability of ePHI. Risks must be subjected to a HIPAA-compliant risk management process and reduced to an acceptable level. Access controls must be implemented to ensure that ePHI can only be viewed by authorized individuals, appropriate security controls must be in place to prevent unauthorized disclosures, and an...

Read More
SonicWall Cyber Threat Report 2018 Shows 71% Decrease in Ransomware Attacks
Mar06

SonicWall Cyber Threat Report 2018 Shows 71% Decrease in Ransomware Attacks

The SonicWall Cyber Threat Report 2018 published this week indicates the volume of ransomware attacks has fallen considerably over the course of the past year, dropping from 638 million attacks in 2016 to 184 million attacks in 2017. While the fall of more than 71% is certainly good news, there has been a notable rise in the ransomware variants used and a sizeable increase in the use of other malware. Between 2016 and 2017 there was a 101.2% rise in ransomware variants in use. SonicWall Captured 2,855 unique ransomware variants in 2017 and reports an 18.4% increase in malware attacks. In 2017, the number of malware attacks rose to 9.32 billion. Ransomware attacks may be down year-over-year, but SonicWall predicts the number of attacks will rise in 2018, albeit targeting different devices. IoT and mobile attacks are likely to become much more common in 2018. SSL/TLS traffic has increased by 24% in the past year as businesses switch from HTTP to HTTPS to provide greater protection for their customers. Cybercriminals have followed suit and are increasingly using SSL/TLS encryption to...

Read More
SpamTitan v7.00 Release Sees Bitdefender Used as Primary AV Engine
Mar05

SpamTitan v7.00 Release Sees Bitdefender Used as Primary AV Engine

TitanHQ has announced the release of a new version of its leading cloud-based anti spam service. SpamTitan v7.00 includes several important updates to better protect users from malicious emails and known threats, including patches for recently discovered vulnerabilities in the ClamAV anti-virus engine. One of the notable changes in the new version is a change to the primary anti-virus engine. SpamTitan v7.00 now offers award-winning anti-malware and ransomware protection through Bitdefender. The change to the Romanian-based antivirus company is part of a growing strategic relationship with the firm that will see further collaboration over the coming weeks and months. The secondary AV engine will continue to be provided by ClamAV. TitanHQ has confirmed that support for Kaspersky AV – the primary AV engine on previous releases of SpamTitan – will stop from May 1, 2018. TitanHQ said its mission is “to provide secure, reliable and affordable security solutions to our partners and customers. Our team continually develops our product suite, implementing customer feedback and feature...

Read More
PhishMe Rebrands as Cofense and Announces Acquisition by Private Equity Syndicate
Feb26

PhishMe Rebrands as Cofense and Announces Acquisition by Private Equity Syndicate

PhishMe, the leading provider of human phishing defense solutions, has announced that from February 26, 2018, the firm will be known as Cofense. Along with the name change, the firm has announced it has been acquired by a private equity syndicate, which valued the firm at $400 million. PhishMe was formed in 2007 with the aim of developing products and services to tackle the growing threat from phishing. Employees have long been viewed as the weakest link in security, yet the human element of security defenses was often neglected. Over the years, PhishMe developed its products and services to help companies improve their last line of defense and turn security liabilities into security assets. PhishMe has helped thousands of organizations improve their defenses against phishing through training and phishing simulations. The firm has also developed a range of associated products and services including a reporting platform that has now been adopted by more than 2 million users, as well as incident response and threat intelligence services. While phishing defense is still at the heart...

Read More
Barracuda Launches New Security Insight Platform
Feb15

Barracuda Launches New Security Insight Platform

The cloud security and data protection company Barracuda has launched a new Security Insight platform that offers real-time threat intelligence and security risk data on the latest threats around the world. Having visibility into the latest threats allows security teams to take proactive steps to improve their defenses against real-world threats and assess the current threat level. Via the platform, users can view summaries and detailed information on web, email, endpoint, and network attacks tracked by Barracuda. For many companies, it is only when a cyberattack and data breach occurs that they become aware of a new threat. Threat intelligence such as that provided through Barracudas Security Insight raises awareness of attacks that are currently taking place around the globe – Awareness of those threats helps businesses take action to improve their security posture. Barracuda performs large-scale analyses of data collected from a wide range of sources which is summarized and presented through the Security Insight platform. The summaries are easy to read and provide bite-sized...

Read More
Webroot Provides DNS Web Filtering for Guest WiFi
Feb14

Webroot Provides DNS Web Filtering for Guest WiFi

Webroot has expanded its SecureAnywhere DNS filtering service to include guest WiFi networks. The new service uses the firm’s domain layer security and content filtering service and ensures high availability of WiFi access via Webroot’s DNS global servers. Businesses are now under pressure to provide free Wi-Fi access throughout their establishment, with many customers choosing businesses based on whether WiFi access is provided. However, Wi-Fi networks can be hijacked and hacked placing customers at risk. Businesses also need to take care to ensure that their WiFi connections are not abused and used for illegal activities such as copyright infringing downloads and the accessing of criminally obscene website content. Webroot’s cloud-based SaaS has been developed to solve the problem and allows businesses to easily provide clean, safe, and secure WiFi access to guests. The solution has been developed to be easy to implement and use, even by those with little technical ability. Setting up content filtering on WiFi networks requires a minor change to DNS settings to redirect guest...

Read More
Barracuda Acquired by Thoma Bravo in $1.6 Billion Deal
Feb12

Barracuda Acquired by Thoma Bravo in $1.6 Billion Deal

The cloud security and data protection firm Barracuda Networks Inc., has been acquired by the private equity investment firm Thoma Bravo in a deal worth $1.6 billion. Financing for the acquisition was provided by Goldman Sachs & Co. LLC, Credit Suisse, and UBS Investment Bank. Barracuda will continue to operate as a privately held company. Barracuda shareholders will receive $27.55 per share of common stock they hold. “Thoma Bravo has an excellent history of investing in growing security businesses, and this transaction speaks to the value and strength of Barracuda’s security platform, which helps customers protect and manage their networks, applications, and data. I expect that our employees, customers, and partners will benefit from this partnership,” said BJ Jenkins, chief executive officer of Barracuda. Barracuda currently protects more than 150,000 customers from email, web, and network attacks with its platform used to protect workloads and applications from the full range of malicious attacks. Its cybersecurity solutions can be centrally managed in...

Read More
PhishMe (Now Cofense) Wins Five Cybersecurity Awards
Feb10

PhishMe (Now Cofense) Wins Five Cybersecurity Awards

PhishMe (now Cofense) has collected five 2018 Cybersecurity Excellence Awards for its phishing defense solutions. The Cybersecurity Excellence Awards program is produced by Cybersecurity Insiders in partnership with the Information Security Community on LinkedIn. The awards program recognizes excellence in the field of cybersecurity with awards being given to companies that have demonstrated excellence, leadership, and innovation in information security. This year there were more than 400 entries across 70 different categories. The awards winners were selected based on the strength of their nominations and members of the Information Security Community are required to vote for their best loved products and services. The finalists for the awards were announced on February 1 and the winners on February 7. To even be named as a finalist confirms that a company has developed exceptional products and services that help businesses protect their networks and data against cyberattacks. Cybersecurity Insiders notes that “All winners and finalists reflect the very best in today’s...

Read More
Symantec Offers Solution for Filtering Uncategorized Websites
Feb06

Symantec Offers Solution for Filtering Uncategorized Websites

Organizations that have implemented URL filtering to control the websites that employees are allowed to access can easily filter websites by category. However, not all websites are categorized, which creates a problem with URL filtering. Without a category, applying category controls is not possible. Now, Symantec has offered a solution to the problem. When new websites are created it takes time for categories to be applied and the lag poses problems for URL filtering. The solution chosen by many organizations has been an all or nothing approach. Block all uncategorized websites or allow them to be accessed. When a category is assigned to the sites, they will be subjected to standard filtering controls. The allow all approach could permit malicious websites to be accessed, while the deny all approach means potentially useful websites will be unnecessarily blocked. While IT departments may be willing to accept the latter, it can result in an increase in support calls to the helpdesk. The Blue Coat Web Filter URL database is comprehensive, although the same problem with uncategorized...

Read More
TitanHQ Partners with HTG Peer Groups
Feb04

TitanHQ Partners with HTG Peer Groups

At the HTG Peer Groups Q1 quarterly meeting in Las Vegas, TitanHQ, the leading provider of cloud-based web filtering and anti-spam solutions, announced it has partnered with HTG: The international coaching, consulting, and peer group organization. The new partnership sees TitanHQ become a Gold vendor, with its cybersecurity solutions made instantly available to HTG community members. HTG was formed in 2000 with the aim of helping businesses expand and realize their full potential. HTG consultants provide insights and share wisdom with business leaders to help them create the accountability and structure necessary to make their businesses a success. Through HTG, business leaders can maximize their potential using tried and tested strategic systems. The path to profitability and success inevitably involves some setbacks and having a partner to provide support and guidance through difficult times can make a big difference. Many companies also require help to avoid common problems: problems that can cause significant, and sometimes catastrophic, losses. One area of concern voiced by...

Read More
Fortinet Launches New Operational Technology Security Solution for Critical Infrastructure Organizations
Jan18

Fortinet Launches New Operational Technology Security Solution for Critical Infrastructure Organizations

Cyberattacks on critical infrastructure are becoming much more common. Cybersecurity reports suggest SCADA/ICS security breaches have been experienced by more than 50% of critical infrastructure organizations in the past 12 months alone. Those attacks can result in major disruption to essential services including energy, water, and healthcare. Unfortunately, there are major differences between traditional information technology and operational technology (OT). Consequently, most enterprise-class security solutions do not have visibility into OT systems due to the highly specialized nature of the technology. Without visibility, it is not possible to effectively defend against cyberattacks on OT systems. However, Fortinet has now developed a security solution that addresses the unique challenges of protecting operational technology. Its latest offering unifies the management and administration of both OT and IT via the Fortinet Security Fabric. The Fortinet Security Fabric allows organizations to deploy advanced cybersecurity controls to keep their OT systems, control systems, and...

Read More
Cyren and Carvir Partnership Sees SaaS Web and Email Security Solutions Offered to MSP Partners
Jan10

Cyren and Carvir Partnership Sees SaaS Web and Email Security Solutions Offered to MSP Partners

Cybersecurity firm Cyren has announced it has formed a new distribution partnership with Carvir that will see the firm’s web and email Security SAAS platforms offered to Managed Service and IT Service Providers. Carvir is a leading global distributor of monitoring and managed cybersecurity services for the IT services and MSP channel. Carvir already offers a wide range of cybersecurity solutions to MSPs and IT service providers, although there was a gap in its DNS, email, and web security solutions. Carvir now has more than 500 MSP partners who serve the needs of tens of thousands of business customers by providing managed security services. Over the past eight months Carvir has been searching for a new provider of cloud-based web security services. There was no shortage of powerful web security solutions, but most web security solutions were not MSP friendly, having been developed for enterprises rather than service providers. Many solutions lacked the multi-tenant capability or pricing model required by MSPs. By adding Cyren to our portfolio, we are delivering a superior security...

Read More
Barracuda Networks Acquires Security Awareness Firm PhishLine
Jan03

Barracuda Networks Acquires Security Awareness Firm PhishLine

Barracuda Networks has announced it has acquired the security awareness and anti-phishing training firm PhishLine. The deal will see PhishLine’s training and phishing simulation platform incorporated into the Barracuda range of AI-driven anti-phishing solutions to provide more comprehensive protection for its customers. Technological defenses against spear phishing and phishing help companies to reduce risk to a reasonable level; however, no solution can be 100% effective against the barrage of spam and malicious emails now being sent by threat actors around the globe. Email is now the leading attack vector and highly sophisticated tactics are now used to bypass security controls and target employees. Social engineering techniques are used to fool employees into revealing their login credentials and install malware and ransomware. Security awareness training is therefore an important part of any cybersecurity strategy. Businesses must ensure that the workforce has the necessary skills to identify new threats and take the appropriate action. This is where PhishLine excels. The...

Read More
Email Archiving Service Added to the Cyren Cloud Security Platform
Jan03

Email Archiving Service Added to the Cyren Cloud Security Platform

Cyren, a provider of DNS, email, and web security solutions, has announced the inclusion of a new email archiving service in its Cloud Security Platform. The platform can be used to keep business email messages secure while ensuring compliance with state and federal email retention regulations. Cyren’s Security-as-a-Service platform combines web security, email security, DNS security, cloud sandboxing, and email archiving into a single cloud-based platform that can be accessed, monitored, and managed through a single web-based administration control panel. The new release comes in response to requests by customers to provide complimentary services to the platform related to email management. Being cloud-based, the solution allows additional services to be easily rolled out to customers, something that would not be possible with appliance-based solutions. The latest addition helps organizations meet their email management compliance obligations, safely and securely store vast quantities of emails without the need for on-premises storage, and ensures all messages can be quickly and...

Read More
Whitelist Only Feature Added to Cisco Umbrella
Dec30

Whitelist Only Feature Added to Cisco Umbrella

Cisco has announced it has added a new whitelist only feature to Cisco Umbrella. The whitelist only option allows organizations to restrict Internet access to a small number of secure websites, and block access to the rest of the Internet. User are able to access the whitelist only option via their Umbrella dashboard. When the whitelist only option is set, all domains will be blocked by default and will be inaccessible. Any attempt made by an end user to visit a website that has not been added to the whitelist will be blocked before a connection is made. Any individual that attempts to access an unauthorized website would be presented a block page or the user could be directed to a specific URL. The setting can be applied to an existing rule or a new rule can be created. The whitelist only option can be set for the entire organization, for a particular network, for user groups, individual users or certain devices. The whitelist option will disable category lists and blocklists and will only allow sites to be added via allow lists. The whitelist can be used for domains or URLs....

Read More
SafeDNS Partners with Router Manufacturers to Provide WiFi Control Straight out of the Box
Dec11

SafeDNS Partners with Router Manufacturers to Provide WiFi Control Straight out of the Box

SafeDNS has partnered with router manufacturers to offer safe WiFI access straight out of the box. Most WiFi routers do not incorporate the necessary controls to allow the filtering of Internet content without the addition of a third-party solution or controls applied at the ISP level. When web-filtering solutions are included, they tend to be basic and typically do not include advanced capabilities such as SSL inspection, so are restricted to blocking HTTP sites. As more businesses mover over to HTTPS, these web filtering controls cease to be effective. Cybercriminals are also making the move to HTTPS, so the failure to decrypt, inspect, and re-encrypt traffic could leave businesses and consumers exposed to online threats. Further, most routers with Internet access controls included do not offer the same granular control as third party solutions and custom filtering rules cannot be applied.  Even in a home environment this can cause problems, as it is not possible to apply different settings for individual users. The all or nothing approach means the same restrictions for a...

Read More
TitanHQ Partners with Etihad Stadium to Secure Guest WiFi Network
Nov24

TitanHQ Partners with Etihad Stadium to Secure Guest WiFi Network

TitanHQ has announced it has partnered with the Etihad Stadium in Melbourne and is providing its client-less DNS Internet filtering solution to secure the stadium’s network of more than 700 WiFi access points. As a modern stadium, it was necessary to provide WiFi access to sports fans, but also to ensure that WiFi could be accessed safely and securely. The stadium operators needed to implement security controls to prevent fans from inadvertently downloading malware, visiting phishing websites, or viewing website content that was inappropriate in a public location. A client-based or appliance-based system would have been impractical, so DNS filtering was the natural choice. A DNS-based URL filtering solution would allow accessible web content to be carefully controlled without latency, ensuring fast Internet access speeds could be enjoyed by all visitors to the stadium. The Etihad stadium chose TitanHQ’s WebTitan Cloud for WiFi to protect its 704 high-speed, high-capacity Internet access points spread throughout its 53,359-seater venue and corporate hospitality areas. The Web...

Read More
Palo Alto Confirms Cybersecurity is a Priority in the NHS
Nov14

Palo Alto Confirms Cybersecurity is a Priority in the NHS

Following the WannaCry ransomware attacks that crippled many NHS Trusts, Palo Alto Networks commissioned a survey with Vanson Bourne on 100 IT decision makers in the NHS. The aim of the survey was to investigate the current state of cybersecurity in the NHS, determine how the NHS is prepared for GDPR data protection rules, and gauge the level of patient trust in NHS data handling. Data Security is Now Being Prioritized Cybersecurity is a critical if the NHS is to realize the full potential of digitalization to make improvements to patient care and to achieve cost savings. 90% of respondents believe cybersecurity must be prioritized to achieve those aims and 83% said cybersecurity was essential to make significant long-term savings. On Average, respondents believed an average of £14.8 million could be saved each year with appropriate cybersecurity investment. While data security is vital, there are other benefits to improving cybersecurity. 65% of respondents believe better cybersecurity would improve patient trust, 49% believe it would allow processes to be streamlined, and 45%...

Read More
Almost Half of IT Decision Makers Say Cybersecurity Still Not a Priority for Board Members
Oct10

Almost Half of IT Decision Makers Say Cybersecurity Still Not a Priority for Board Members

Fortinet has published the results of its Global Enterprise Security Survey. The report indicates board members are still not taking sufficient interest in cybersecurity, even with the high volume of cyberattacks that are now being reported. The survey was conducted on 1,801 IT decision makers with responsibility/visibility of IT security. The global survey was conducted in 16 countries including the United States, Canada, Germany, France, Australia, India, and the UK. 48% of respondents said they did not believe cybersecurity was a top priority up for discussion by the board, with 77% or respondents believing the board should be scrutinizing IT security much more carefully. IT security is now viewed as a strategic board decision rather than simply an IT investment and a matter for the IT department to deal with. The need for board involvement has been highlighted by the rapid rise in cyberattacks in recent years. 85% of businesses have experienced a security breach in the past two years. The most common attacks involved malware and ransomware. Malware/ransomware attacks had been...

Read More
SonicWall Reports 524% Increase in Malware Variants in the Past 6 Months
Oct04

SonicWall Reports 524% Increase in Malware Variants in the Past 6 Months

There has been 524% growth in the number of malware variants captured by SonicWall in the past six months and a 57% increase in new malicious files analyzed each day. More than 1,000 new malware variants are now used to attack SonicWall customers each day. The global Wannacry and NotPetya attacks were headline news in 2017 and claimed many victims, but the attacks continued as news coverage died down. New strands of Wannacry and NotPetya malware have been developed and continue to be used to attack organizations that have failed to update and secure their systems. There has also been a significant rise in ransomware cyberattacks on small businesses in 2017. Those attacks can be devastating. A study conducted by Osterman research indicates the number of SMBs forced out of business as a result of ransomware attacks has increased by 22%. With the average cost of a data breach now $3.62 million that comes as no surprise. The massive increase in new malware and ransomware variants places a strain on traditional cybersecurity solutions. The rise in attacks and the high cost of mitigation...

Read More
LightSpeed Systems Incorporates New Options for Filtering SSL and Google Services
Sep28

LightSpeed Systems Incorporates New Options for Filtering SSL and Google Services

One of the biggest challenges for organizations wishing to filter the internet is inspecting encrypted websites without violating the privacy of users. Encryption is important to protect the privacy of web users, but for schools, it poses a challenge. Information such as credit card details need to be protected by encryption, but it is also important for SSL websites to be monitored and web access managed to ensure students are protected. Many schools have problems determining how SSL websites can be decrypted, analyzed, and re-encrypted to protect students with their existing web filter. Schools also want to filter individual YouTube videos, rather than having to block the entire website and prevent students from accessing important educational material. They also want to have visibility into Google searches and block certain searches from generating search results. Similar controls must also be implemented to prevent certain Google images from being displayed. Most schools get around the problem by using proxies, certificates and PAC files, although such measures are not easy to...

Read More
SonicWall Responds to Increasing Cyber Threats with Major Expansion of Cybersecurity Solutions
Sep27

SonicWall Responds to Increasing Cyber Threats with Major Expansion of Cybersecurity Solutions

The massive rise in new ransomware and malware variants, and the increasing sophistication of cyberattacks on businesses have been accompanied by unprecedented innovation at SonicWall, which has rapidly expanded its range of cybersecurity solutions in response to the growing demand for more powerful solutions. SonicWall has now released its new SonicOS operating system, which includes more than 50 new features to enhance security and is the biggest customer-driven release in the history of the company. The SonicOS (v6.5) powers SonicWall’s Automated Real-Time Breach Detection and Prevention Platform. The new release has enhanced threat API capabilities that allow businesses to automate security systems and incorporate third-party intelligence feeds. New wireless features improve connectivity for an increasingly mobile workforce and help security teams enforce their policies across the entire organization. Advanced networking and connectivity capabilities have also been introduced to provide uninterrupted threat protection for connected networks of all types and sizes. The new...

Read More
Webroot Quarterly Threat Trends Report Reveals 1.5 Million New Phishing Sites Created Each Month
Sep22

Webroot Quarterly Threat Trends Report Reveals 1.5 Million New Phishing Sites Created Each Month

Webroot has published its Quarterly Threat Trends Report for Q2, 2017 which highlights the growing threat from phishing. On average, each month in Q2 saw 1.385 million new phishing webpages created each month, although there was a major spike in May when 2.3 million new phishing websites were detected. On average, more than 43,000 new phishing websites are created each day. The quality of the sites has also increased. It is now virtually impossible to tell from the content of the page whether the website is genuine. The websites are highly realistic and use the same imagery, color schemes, logos and graphics as the sites they mimic. The only tell-tale sign that the websites are not genuine are the domain names used. The most commonly spoofed brand is Google. 35% of phishing sites impersonate Google to obtain Gmail and Google Drive credentials. Chase bank is the second most spoofed brand accounting for 15% of sites followed by Dropbox (13%), PayPal (10%), Facebook (7%), Apple (6%), and Yahoo and Wells Fargo (4%). The websites have a common purpose. To fool consumers and business...

Read More
Cyren Collects Two Cybersecurity Breakthrough Awards for Web and Email Security
Sep20

Cyren Collects Two Cybersecurity Breakthrough Awards for Web and Email Security

At this year’s Cybersecurity Breakthrough Awards, Cyren was honored with two awards in the email and web security categories – The only company in this year’s program to collect two awards. The Cybersecurity Breakthrough Awards program was developed to recognize and reward companies that lead the field in IT security and have shown a high level of innovation and have brought exciting, powerful, and reliable cybersecurity products to the market. This year saw more than 2,000 companies and products nominated for the awards with cybersecurity companies from 12 countries competing. Nominees in categories such as email security, web security, threat detection, risk management, APT protection, identity management, mobile security, and risk management were assessed by a panel of independent judges drawn from the information security industry.  Nominees were narrowed down to produce a shortlist of finalists and category winners. Cyren, a provider of web, email, and DNS security solutions, was honored with Hosted Email Security Solution of the Year Award in the email security category....

Read More
CyberSecurity Breakthrough Names SonicWall ‘Cybersecurity Company of The Year’
Sep20

CyberSecurity Breakthrough Names SonicWall ‘Cybersecurity Company of The Year’

Each year, CyberSecurity Breakthrough runs an award program that recognizes the efforts and achievements of technology companies, their products, and the people who drive innovation. The awards program covers the full spectrum of cybersecurity solutions including email, web and cloud security, threat detection, fraud prevention, risk management, firewalls, and UTMs across 16 product categories. Each year, the scale of the awards program grows. More than 2,000 nominations were received for this year’s awards program, with companies coming from 12 countries around the world. Those nominations were assessed by a panel of independent expert judges from the cybersecurity community who whittled down the field and selected the companies, products, and people that are having the biggest impact in their respective fields. This year, awards were given to some of the biggest names in cybersecurity including Paloalto networks, Crowdstrike, Proofpoint, Trend Micro, CipherCloud, Avast, and Lookout. There were more than 60 awards issued in this year’s program, with SonicWall chosen as the overall...

Read More
PhishMe Report Shows Organizations Are Struggling to Prevent Phishing Attacks
Sep19

PhishMe Report Shows Organizations Are Struggling to Prevent Phishing Attacks

Organizations are struggling to prevent phishing attacks, according to a recently published survey by PhishMe (now Cofense). The survey, conducted on 200 IT executives from a wide range of industries, revealed 90% of IT executives are most concerned about email-related threats, which is not surprising given the frequency and sophisticated nature of attacks. When attacks do occur, many organizations struggle to identify phishing emails promptly and are hampered by an inefficient phishing response. When asked about how good their organization’s phishing response is, 43% of respondents rated it between totally ineffective and mediocre. Two thirds of respondents said they have had to deal with a security incident resulting from a deceptive email. The survey highlighted several areas where organizations are struggling to prevent phishing attacks and respond quickly when phishing emails make it past their defenses. PhishMe also notes that many first line IT support staff have not received insufficient training or lack the skills to identify phishing emails. Consequently, many fail to...

Read More
IWF Blacklist Incorporated into a Category on Cisco Umbrella
Sep08

IWF Blacklist Incorporated into a Category on Cisco Umbrella

Cisco has announced that its users can now quickly and easily block all employees from accessing websites containing images of child sexual abuse. A blacklist of domains and URLs containing images of child abuse is maintained by the UK’s Internet Watch Foundation (IWF). The IWF is a non-profit organization dedicated to removing all online images of child sexual abuse and preventing child sexual content from being accessed via the Internet. The list contains domains and URLs hosted all over the world that have been discovered to contain these sexual images, in addition to non-photographic images of child abuse hosted in the UK. In addition to searching the Internet for illegal sexual images of children, the charity mans a hotline that allows anyone to report websites found to be hosting child sexual images. Those reported URLs and domains are then added to the blacklist. The IWF supplies partners with up-to-date blacklists allowing them to easily block the illegal content via their filtering technologies. Cisco has now partnered with the IWF and has adopted its list and added it as...

Read More
Partnerships with Hospitals, Schools and Insurance Firms Fuels Growth at TitanHQ
Aug28

Partnerships with Hospitals, Schools and Insurance Firms Fuels Growth at TitanHQ

TitanHQ has announced it is enjoying sustained growth that has been fueled by new partnerships with hospitals, school districts, and insurance firms who have chosen to secure their wired and wireless networks with the WebTitan web filtering solution and use the firm’s cloud-based anti-spam service to keep their inboxes spam free. Over the course of the past 12 months, TitanHQ has been increasing its healthcare clients. The healthcare industry is being targeted by hackers and ransomware and malware attacks have soared in recent months. Two of the main ways that malware and ransomware is installed is via malicious links in emails and drive-by downloads, which can be blocked with WebTitan. The latest health system to sign up and use WebTitan is the European Hospitals Group – a leading health system in Brussels in Belgium. The multi-lingual hospital group operates two facilities in Uccle and the Etterbeek/European Quarter and employs more than 1,800 staff. The hospital has now implemented WebTitan to prevent web-based malware attacks and to control the content that can be...

Read More
Security Awareness Firm Securecast Acquired by Webroot
Aug16

Security Awareness Firm Securecast Acquired by Webroot

Webroot has announced it has completed the acquisition of Securecast – A security awareness and training platform that can be used by businesses to create a security culture and prepare employees for phishing attacks. Webroot already offers businesses a range of solutions to counter the threat from phishing, although even with layered defenses and technological solutions, some phishing emails will slip through the net. It is therefore essential for businesses to ensure that they take steps to address the human factor in phishing attacks and conduct security awareness training, educate employees on cybersecurity best practices, and train staff how to recognize phishing emails. The acquisition of Securecast will allow Webroot to provide a more comprehensive suite of anti-phishing solutions to its customers. The company has rebranded the platform Webroot Security Awareness Training and will make it generally available for all Webroot customers in the fall when it will be incorporated into the Webroot SecureAnywhere® business portfolio. Over the next couple of months Webroot plans to...

Read More
New Web Filter Bypass Controls Incorporated into Web Filter Longhorn
Aug15

New Web Filter Bypass Controls Incorporated into Web Filter Longhorn

The use of a web filter is essential in many industries, especially in education where it is necessary to block access to adult content and images for CIPA compliance. Implementing a web filter can help to ensure users are prevented from accessing certain categories of web content, although there will be many individuals that attempt to bypass web filter controls and gain access to restricted content. There are several publicly available tools that can be used to bypass web filtering controls, and a quick google search is all it takes to find them. Schools need to have visibility into these attempts and ideally, be able to block all attempts to bypass the web filtering controls. When attempts are made to bypass the web filter, instant alerts are required to allow rapid action to be taken to terminate sessions. Preventing the use of blocking tools such as Ultrasurf, Hotspot Shield, and Psiphon can be problematic with many web filters; however, Lightspeed Systems has a solution. In the latest version of Web Filter Longhorn, users are given better visibility to allow them to rapidly...

Read More
SafeDNS Earns AV-Comparative Award for Web Filtering
Aug14

SafeDNS Earns AV-Comparative Award for Web Filtering

The independent testing lab AV-Comparatives conducts extensive tests of anti-virus and other security software to provide businesses and consumers with advice on the top security products. In this year’s tests on parental control and web filtering solutions, SafeDNS was ranked in the top three out of all parental control solutions under test. SafeDNS provides consumers with the ability to carefully control the types of content that can be accessed via their home networks, with the solution also offered to businesses to prevent employees from accessing content not suitable for the office. One of the main uses of the solution at home and in the workplace is to prevent pornography from being accessed – An area where the solution performs particularly well, blocking 99.8% of adult content in the AV-Comparatives test. No other solution under test performed as well at filtering adult content. Following tests in previous years, SafeDNS has made improvements to its category filters in other areas, notably the blocking of gambling sites and weapons-related content. The solution blocked 94%...

Read More
Forcepoint Adds New Capabilities to CASB, Web, and Email Security Solutions
Aug01

Forcepoint Adds New Capabilities to CASB, Web, and Email Security Solutions

Forcepoint has announced its security solutions now incorporate new behavior-driven controls to help protect critical business data, intellectual property, and employee devices. Forcepoint CASB, Web Security and Email Security have all been updated and now have new capabilities. New CASB analytics have been incorporated to help organizations reduce the time it takes to identify data breaches. Forcepoint cites Gartner data, which shows the dwell time between an attack and discovery is an average of 99 days. The longer a breach continues before it is discovered and mitigated the higher the cost to the organization. By using data and analytics it is possible to greatly reduce the time between an attack and detection, and thus reduce the cost and damage caused. Forcepoint CASB helps organizations study the actions of users to identify risky behavior and vulnerabilities, allowing IT teams to take action to be taken before a breach occurs. The solution also helps IT teams identify anomalies which are indicative of a data breach and take rapid action to mitigate attacks. The new...

Read More
96% of SMBs Susceptible to External Cybersecurity Threats
Aug01

96% of SMBs Susceptible to External Cybersecurity Threats

Webroot has published the results of a new study that examined how well small to medium sized businesses are prepared to deal with cyber threats. The study revealed the majority of SMBs are not currently equipped to deal with external cybersecurity risks and believe they are susceptible to external cybersecurity threats. 600 IT decision makers in the UK, USA, and Australia were surveyed by Wakefield Research on behalf of Webroot. All respondents were employed by small to medium sized businesses with between 100 and 499 employees. 96% of respondents said they believe their organization will be susceptible to cyber threats this year and while their organization is aware of the current threat landscape and the growing number of threats, 71% of respondents said they are not well prepared to address them. The main concerns are malware infections, mobile attacks, and phishing incidents. 56% of respondents were most concerned about malware, 48% most concerned about threats to company-owned or BYOD mobile devices, and 47% were particularly concerned about phishing. The fallout from a...

Read More
Securly Announces New Initiative and Partnership to Benefit Education Sector
Jul13

Securly Announces New Initiative and Partnership to Benefit Education Sector

The San Jose, CA-based web filtering solution provider Securly has announced a new partnership with WiscNet to better protect Wisconsin students from harmful Internet content. The firm’s standard Chrome-based web filtering solution has also been made available free of charge to K12 schools across the United States. WiscNet Partnership Sees Discounts Offered on K12 Web Filter Solutions WiscNet is a membership organization that offers education services to public and private schools throughout Wisconsin. A partnership with Securly is allowing existing and new members to obtain significant discounts on the Securly web filtering service. Securly’s web filter has primarily been developed for K12 schools and educational institutions to make Internet filtering more straightforward. The cloud-based filter can be used to secure devices connected to school and other Wi-Fi networks and prevents students from visiting inappropriate websites. The solution can also monitor social media accounts and email activity and generate alerts of potential self-harm and bullying. The solution also includes...

Read More
Symantec to Acquire Fireglass to Improve Protection from Ransomware, Malware and Phishing Attacks
Jul08

Symantec to Acquire Fireglass to Improve Protection from Ransomware, Malware and Phishing Attacks

The cybersecurity giant Symantec acquired the web security firm Blue Coat last year in a deal worth $4.65 billion. That was followed by the acquisition of the identity theft protection company Lifelock in a deal worth $2.3 billion in November. Now the Security software giant has announced a further acquisition: the Israeli cybersecurity startup Fireglass. At this stage the price and terms of the acquisition deal have not been disclosed. The acquisition of Blue Coat has allowed Symantec to move into the enterprise web security market, LifeLock has helped improve its footprint in the consumer market, and the Fireglass acquisition will allow the firm to improve its malware, ransomware, and phishing protection offerings. Tel Aviv-based Fireglass was founded in 2014 and has developed innovative technology that helps companies protect against malware, ransomware, and phishing threats. Phishing emails target a weak point in security defenses: Employees. While email security solutions can be deployed to block these threats from reaching inboxes, many malicious emails are still delivered....

Read More
GFI Software Recognized for Quality of Support and Product Documentation
Jul07

GFI Software Recognized for Quality of Support and Product Documentation

GFI Software has been recognized for the quality of its customer support and product documentation by the Society of Technical Communications (STC). The STC is an international professional association that evaluates technical communications between companies and customers, and assesses the standard of technical support, product documentation, and company training materials. The aim of the STC is to advance technical communications and promote better content and information management via technical processes. The non-profit organization helps businesses improve their technical support across all media to ensure customers can use products safely, securely, effectively and get the best value from their investment. This year, the GFI Software team has collected four STC awards in the international and regional categories of the STC awards program. In the User Support: Help category, GFI Software collected a Distinguished Technical Communication Award and a Best of Show Award in the regional subcategory, with its regional support also competing with the GFI Help System. The GFI Help...

Read More
Symantec Included in Leader’s Magic Quadrant for Secure Web Gateways
Jul03

Symantec Included in Leader’s Magic Quadrant for Secure Web Gateways

The cybersecurity firm Symantec has been included in the leader’s Magic Quadrant for Secure Web Gateways by Gartner. This year, the company is the only solution provider in the leader’s quadrant that offers both cloud-based and on-premise web gateway solutions. Only one other company was included in the leader’s quadrant this year – Zscaler. Zscaler was rated highest for completeness of vision, while Symantec was rated highest for ability to execute. Three companies were included in the Challenger’s Quadrant, and 5 in the Nice Player’s Quadrant. This is the 10th consecutive year that the technology behind Symantec’s secure web gateway has been included in the Leader’s Quadrant. Symantec was included in 2016 and 2017, and as Blue Coat in earlier years. Symantec acquired Blue Coat last year. Gartner assesses companies for their completeness of vision and ability to execute, with the assessment based on 15 different criteria. The combined assessments across those criteria resulted in Symantec receiving the highest rating. Secure web gateways incorporate URL filtering to control the...

Read More
Kenilworth Update Improves Authentication on Smoothwall Web Filter
Jun29

Kenilworth Update Improves Authentication on Smoothwall Web Filter

The latest update to the Smoothwall web filter sees improvements made to authentication and safeguarding, along with the option of adding a Google sign-in button to the login page to allow access with a single click. One of the main features to be added to the Smoothwall’s secure web gateway web filter by the Kenilworth update is the incorporation of IDex identity indexing, which makes the process of authenticating users far simpler. IDex is also a more scalable identity checking mechanism that authentication. IDex does not depend on a connection to domain controllers for authenticating users and there are no delays to user access with this new identification system. At the heart of IDex is the IDex Directory – a database housed on a Smoothwall appliance that contains all the necessary user identity information. IDex Directory records the username, IP address, groups, and logged-in timestamp for each user, and integrates that information with all Smoothwall services that require identity verification. Data are also replicated across nodes. Workstations have the IDex Client running...

Read More
Fortinet Named Leader in Gartner Magic Quadrant for Unified Threat Management
Jun28

Fortinet Named Leader in Gartner Magic Quadrant for Unified Threat Management

For the 8th consecutive year, Fortinet has been named a leader in Gartner’s Magic Quadrant for Unified Threat Management for its SMB multi-function firewalls. The Magic Quadrant is a graphical representation of competitive positioning, broken down into four quadrants with technology providers ranked as leaders, visionaries, niche players, and challengers. Challengers rank highly for their ability to execute in today’s marketplace, yet they lack understanding of the direction the market will move in the future. Niche players lack focus and do not innovate or outperform other companies, yet may still offer products well suited to many businesses. Visionaries have an excellent grasp of the market but are not executing to their full potential. The leader’s quadrant includes companies that execute well against their current vision and have an excellent understanding of the market and where it is going. The Magic Quadrant provides companies with a view of the relative positions of each player in the market and allows them to determine which companies are performing the best and which are...

Read More
Palo Alto Networks Launches New Cloud-Based Security Service for Mobile Users
Jun14

Palo Alto Networks Launches New Cloud-Based Security Service for Mobile Users

Palo Alto Networks has launched a new cloud-based security service that can be used to protect remote locations and users of mobile devices via the Palo Alto Networks Next-Generation Security Platform and apply security controls such as URL Filtering and Threat Prevention. Many businesses operate across multiple locations and have a highly distributed workforce. The new Palo Alto Networks GlobalProtect cloud service makes it easier for businesses to secure remote networks and protect mobile users without backhauling traffic to the corporate network or using multiple point products. The new Palo Alto Networks GlobalProtect cloud service protects all employees via the Palo Alto Networks Next-Generation Security Platform, regardless of where they are located. The GlobalProtect cloud service allows administrators to easily add new locations and mobile workers and implement and update security policies as required. The service is always on and kept up to date and helps organizations ensure consistent security for the entire organization, regardless of location or the devices used. With...

Read More
Expanded Webroot and ConnectWise Partnership Help Customers Block Web-Based Threats
Jun07

Expanded Webroot and ConnectWise Partnership Help Customers Block Web-Based Threats

Webroot has expanded its partnership with ConnectWise which will see its Webroot SecureAnywhere® DNS Protection platform offered to ConnectWise customers to help them block web-based threats more effectively. Webroot SecureAnywhere® DNS Protection is a web filtering solution that can be used by businesses to carefully control the websites that can be accessed by employees. Webroot uses IPv4 and IPv6 addresses to classify more than 95% of the Internet at least three times a day, with sites added to one or more of the 80 categories used by the platform. Users can select which categories they allow their employees to access with controls applied for specific users, groups, or for the entire organization. In addition to offering category filtering controls the solution also blocks websites known to host malware and phishing websites. Since more than 85% of malware infections occur via the web, by controlling the websites that employees can access it is possible to significantly improve an organization’s security posture and protect against malware, ransomware, keyloggers, and spyware....

Read More
TigerText Secure Messaging Platform Update Helps Optimize Clinical Workflow
Jun03

TigerText Secure Messaging Platform Update Helps Optimize Clinical Workflow

TigerText, the leading HIPAA-compliant secure text messaging platform provider, has announced a new release of its platform. The updated version of the TigerText platform includes a host of new features that improve usability and help reduce the costs of care delivery and improve clinical workflow efficiency.     The new features include an automatic message forwarding function, priority messaging feature and a new standalone desktop application. The desktop app helps healthcare professionals coordinate patient care more efficiently and speed up the exchange of information. TigerText collects comments from platform users via its voice-of-the-customer program. Hundreds of comments have been submitted which were reviewed and evaluated by the product development team. Requests for updates and new features were prioritized to ensure the most beneficial changes were brought to market quickly. The full list of updates for Android, iOS and desktop applications are detailed below: New Desktop App: The new app includes automatic updates and alerts and allows the TigerText messaging platform...

Read More
Purple Move on WiFi Security Sets Example for All Public WiFi Deployments
May25

Purple Move on WiFi Security Sets Example for All Public WiFi Deployments

Wireless networks offer many benefits to healthcare organizations. Healthcare professionals can access networks and data from any location using portable devices, without the need to plug in to the network. Many medical devices connect wirelessly to WiFi networks improving clinical workflows. However wireless networks can also introduce risks. If any PHI is transmitted over wireless networks, HIPAA requires appropriate controls to be applied to safeguard the confidentiality, integrity and availability of PHI. If WiFi networks lack appropriate security, unauthorized individuals could intercept WiFi packets and view sensitive data, including protected health information. Securing internal WiFi networks is therefore essential. The failure to secure WiFi networks would place an organization at risk of a HIPAA penalty. The risk of a HIPAA violation or data breach is a real concern for healthcare organizations. Security concerns have prevented many hospitals from offering WiFi access to patients, even though offering WiFi can improve the patient experience. Many healthcare organizations...

Read More
TitanHQ Partnership with ADTRAN Enables MSPs to Deliver Cloud-Based Security Solutions
Apr11

TitanHQ Partnership with ADTRAN Enables MSPs to Deliver Cloud-Based Security Solutions

TitanHQ has announced a new partnership with ADTRAN, the leading global provider of communications and networking equipment. The partnership will see ADTRAN expand its ProCloud Subscription Services Suite to four new solution categories to better meet the needs of managed service providers (MSPs). The ProCloud Subscription Services Suite brings together industry-leading cloud-based solutions to allow MSPs to better meet the needs of their customers. The four solution categories that now comprise the suite of services are ProCloud Unified Communications, ProCloud Analytics, ProCloud Network Management and ProCloud Security. TitanHQ’s cloud-based web filtering solution – WebTitan – and cloud-based spam filtering solution – SpamTitan – have been added to the ProCloud Security solution. WebTitan allows organizations to carefully control the web content that can be accessed by employees while protecting organisations from a wide range of web-borne threats such as phishing websites and downloads of ransomware and malware.  SpamTitan is a full-service email security solution that...

Read More
Securly Launches Anycast DNS powered Internet Filtering Service
Mar31

Securly Launches Anycast DNS powered Internet Filtering Service

Securly has announced that its K12 web filtering solution is now being served through Anycast DNS on AWS. Anycast DNS speeds up the load time of websites by routing the user to the nearest server to the user’s location. Websites can be located on servers all over the world, which will naturally involve some latency when the user is some distance away from the server. Anycast DNS essentially brings that content closer. Typically, a content distribution network (CDN) is used to achieve this. A CDN is a network of proxy servers and data centers through which web content can be served to reduce latency and ensure availability. Servers are chosen based on which is the closest and has the lowest latency. While CDNs are effective at speeding up the loading of static or cached web content, they do not work so well for dynamic content and do not work with Internet protocols such as DNS. Anycast DNS solves that problem. Anycast allows different web servers to share the same IP address, which means clients requests can be taken to the nearest web server serving that content – the server with...

Read More
Web Filter Longhorn Version 3.2.1 Released
Mar30

Web Filter Longhorn Version 3.2.1 Released

Lightspeed Systems has released an updated version of its education industry-focused web filter Longhorn. Version 3.21 of Web Filter Longhorn incorporates a number of enhancements to make monitoring and managing website and mobile traffic easier. The new web filter has been made more powerful, incorporating enhanced SSL decryption and more intelligent user identification to ensure users can be easily identified regardless of where they are accessing the Internet. The Adaptive AI database has also been improved for more accurate categorization of websites, reducing the potential for the overblocking of website content. Other major updates include: Allowing users to prioritize identification methods and select the order that each method of identification will be attempted. The addition of a second level of control for restricting access to YouTube videos. If used, administrators can set the YouTube filter as strict or moderate. Version 3.2.1 now incorporates Bing Safe Search, in addition to Google Safe Search The certificate installation process has been simplified by changing the...

Read More
GFI Software Launches New Email Security and IT Management Platforms
Mar21

GFI Software Launches New Email Security and IT Management Platforms

GFI Software has announced the launch of two new software platforms which have now been finalized after an extensive period of evaluation. Both products have been in beta form since November 2016 and have been tested by a limited group of users who have provided comments and feedback. GFI Software has taken the feedback on board and has made changes to the implementation of certain features to make the products more user friendly. The solutions include enterprise-class IT management features tailored for small business users. GFI OneGuard is an IT management platform that allows sysadmins to manage, monitor, and secure their networks through a single management console. The platform maintains an inventory of all hardware and software and helps keep all software systems up to date by scanning for out of date installations, unpatched systems and vulnerabilities that could potentially be exploited to gain access to networks and data. Beta testers praised the solution for its unified view of patch management, AV protection, and asset tracking and the ability to automate time consuming...

Read More
Smoothwall Inverness Update Sees Improvements Made to Safeguarding and Firewall
Mar14

Smoothwall Inverness Update Sees Improvements Made to Safeguarding and Firewall

The Inverness update to Smoothwall products sees several improvements made to the firewall and Safeguarding features to improve usability. The changes made to the firewall include a new user interface that clearly displays all firewall rules, together with the configuration specified for each. The rules are also displayed in groups of similar rules to make administration easier. Configuring and editing firewall rules has also been simplified with a new pop-up that requires fewer clicks. Objects can be created and used for groups of IP addresses and services, with one rule applying to several different addresses. Objects can also be reused for other rules. Improvements have also been made to the firewall log viewer, incorporating more information on the screen to make it quicker and easier for users to find the information they need. Details of specific connections can also be found more easily thanks to a new log filter system. The web filter benefits from two new filtering categories – Web Hosting and Collaboration Software. The Web hosting category includes sites that offer...

Read More
Securly Launches DNS-Based iPad Web Filtering Solution
Mar08

Securly Launches DNS-Based iPad Web Filtering Solution

Securly is the first web filtering service provider to develop a DNS-based web filter for iPads. While web filtering is already available for IPad users, the DNS-based approach eliminates the problems associated with browser-based filtering and the use of proxies. While it is straightforward to apply web filtering controls on laptop computers and desktops, extending that filtering to iPads has proved to be a major challenge. It is possible to apply DNS filtering controls to Windows laptops and Chromebooks, but due to the limitations of the architecture on iPads it was not possible to make DNS settings stick across Wi-Fi and LTE networks. iPads use the Safari web browser which could not easily be secured using a DNS-based web filtering system. Consequently, the alternative was to use other browsers that could easily be secured. The problem is that on iPads, links are opened in Safari, which would bypass filters applied to other browsers. In industries such as education this would create a problem. Compliance with CIPA would require the Internet to be filtered on all devices, all the...

Read More
TigerText to Provide Healthcare Messaging for New Hampshire Health Information Organization
Feb20

TigerText to Provide Healthcare Messaging for New Hampshire Health Information Organization

TigerText has announced that the company´s secure messaging platform has been selected to provide secure healthcare messaging for the New Hampshire Health Information Organization. The New Hampshire Health Information Organization (HNNIO) is a non-profit organization created to facilitate the digital exchange of patient health information. The HNNIO connects more than one hundred healthcare providers in New Hampshire in order to share patient health information needed for informed care decisions, and to improve quality, efficiency and patient safety while reducing healthcare costs. The organization has selected TigerText to provide secure messaging in order that physicians, nurses, and care providers can quickly connect with one another in a secure and compliant manner that ultimately improves patient care, workflow and ROI. Mary Beth Eldredge, Board Chair of NHHIO said “The use of secure texting can greatly improve the efficiency and effectiveness of care coordination and provider communication.” The TigerText platform will provided the network with an efficient and secure method...

Read More
EdgeWave Wins 2017 Cyber Defense Magazine InfoSec Award for its Content Filtering Solution
Feb14

EdgeWave Wins 2017 Cyber Defense Magazine InfoSec Award for its Content Filtering Solution

EdgeWave has collected a Cyber Defense Magazine InfoSec Award for its leading web security solution iPrism. Cyber Defense Magazine is the leading electronic information security magazine and a regular sponsor of the RDA Conference – The biggest Infosec conference in the world. The magazine has 100,000 monthly readers and provides invaluable advice for information security professionals and is the leading source for IT security information. Throughout the year, Cyber Defense Magazine reviews hundreds of products and gives readers impartial advice on the best cybersecurity products on the market. The best companies and their cybersecurity solutions are recognized through its annual awards program, which is now in its fifth year. Companies can submit their products for consideration for an award and an independent panel of judges reviews the submissions and selects finalists and the winners of each category. The judges are all CISSP, FMDHS, CEH, certified security professional who vote for each product after conducting a thorough review of the company, its data sheets, white papers,...

Read More
Cisco Launches First Cloud-Based Secure Internet Gateway
Feb09

Cisco Launches First Cloud-Based Secure Internet Gateway

The popularity of Software-as-a-Service (SaaS) applications has grown considerably in recent years. Working practices have changed, and SaaS is well suited to an increasingly mobile workforce. SaaS is certainly not a fad. The use of SaaS is likely to grow considerably over the coming years, with Gartner predicting an increase in SaaS use of 70% by 2018. While branch offices used to connect to the Internet via the corporate network, now many offices are connecting to the Internet directly, which means they bypass many network and Internet security controls. Not only does this increase risk, organizations potentially now lack visibility into threats targeting certain sections of the enterprise. One way organizations have got around this is with the use of virtual private networks (VPNs), although VPNs are not always used by employees. A recent survey conducted by IDG revealed 82% of mobile workers did not always use VPNs. An alternative strategy is to use on-premise web gateway solutions; however, multiple secure web gateways add complexity and latency and are therefore far from an...

Read More
Range of Next-Gen Firewall Devices Expanded by Palo Alto Networks
Feb07

Range of Next-Gen Firewall Devices Expanded by Palo Alto Networks

Palo Alto Networks has announced its range of next generation firewall devices have been expanded. Six new hardware firewall appliances are now available, and the range of VM-Series virtual appliances has been increased by three. The purpose-built hardware appliances include three devices in the PA-5200 Series (PA-5260, PA-5250 and PA-5220) which include a new architecture with 72 Gbps App-ID and 30 Gbps Threat Prevention performance. The new PA-5260 model has been developed for high throughput environments and is ideally suited for data center consolidation, higher gateway demands, and for inspecting encrypted SSL traffic. This is the most powerful device in the range and can cope with 32M sessions, has 3.2M SSL-decrypt session capacity, and offers 6.5 Gbps SSL-decrypt throughput. Two devices are offered in the PA-800 series (PA-850 and PA-820). These devices are best suited to medium-sized networks and branch and remote offices. The PA-850 model offers 1.9 Gbps App-ID and 780 Mbps Threat Prevention performance, with multiple CPU cores, and 8GB memory. The PA-220 completes the new...

Read More
Internet Security as a Service Platform Launched by Cyren
Feb02

Internet Security as a Service Platform Launched by Cyren

Cybersecurity firm Cyren has announced the launch of a new Cyren Cloud Security platform, which combines Internet, email, and DNS security with cloud sandboxing in a single cloud-based platform, with all services accessible through a single pane of glass. Email and web security solutions had previously been developed by Cyren, although both were offered as separate solutions. The combination of these cloud security services into the same platform makes it easier for businesses to implement, configure, and manage the solutions. Cyren Cloud Security 4.0 offers users a single dashboard through which summaries of the web and email threats that have been detected and blocked can be viewed. The dashboard allows administrators to see threat summaries at a glance and drill down for more detailed information. Cyren Cloud Security uses a common policy framework for email and web security services with integrated reporting, license management, and customer onboarding. At the heart of the platform is the Cyren GlobalView Threat Intelligence Cloud, which offers industry leading detection,...

Read More
EdgeWave Launches iPrism Secure Web Gateway 8.1
Jan24

EdgeWave Launches iPrism Secure Web Gateway 8.1

EdgeWave has announced the release of version 8.1 of the iPrism Secure Web Gateway. The updated Internet filtering and cybersecurity solution features enhanced security controls and more granular policy control to provide even greater protection while making management of the solution more straightforward. The iPrism Secure Web Gateway is an appliance-based web filtering and Internet security solution that provides protection from a wide range of web-based threats, while allowing organizations to carefully control the content that can be accessed via their Internet connections. The latest version the web gateway is a set it and forget it solution, offering comprehensive URL filtering and malware protection with minimal maintenance. The latest release gives users even better value, usability, and performance, thanks to several key upgrades. While an appliance-based solution, iPrism is deployed as a cloud-hybrid platform and features highly granular controls to keep networks secure and free from malware. The latest release of IPrism includes a totally redesigned reporting system...

Read More
Kerio Technologies Acquired by GFI Software
Jan20

Kerio Technologies Acquired by GFI Software

GFI Software has announced it has acquired Kerio Technologies, a provider of unified threat management and collaboration software for small to medium sized businesses. The acquisition will see Kerio Technologies’ suite of solutions incorporated into GFI Software’s portfolio of products. Kerio Connect, Kerio Control, Kerio Cloud, and Kerio Operator will now be made available to GFI Software MSPs, resellers, and customers. San Jose, CA-based Kerio Technologies was founded in 1997 and has developed a range of communications and security solutions for small to medium sized businesses. Those solutions have been deployed by more than 60,000 businesses in more than 100 countries around the world. The simple but powerful communication and security tools were available exclusively through an extensive partner network with more than 6,500 resellers. The suite of solutions includes email security, UTM/firewalls, VoIP and collaboration tools and were used by millions of end users around the globe. GFI Software is part of the ESW Capital group of companies and has developed its own range of...

Read More
New Security Categories Added to Cisco Umbrella to Monitor and Block DNS Tunneling
Jan17

New Security Categories Added to Cisco Umbrella to Monitor and Block DNS Tunneling

Cisco has added two new security categories to Umbrella to help customers identify and analyze potentially harmful Internet traffic and security threats. The two new categories – DNS tunneling VPN and Potentially Harmful – help customers mange the risk of DNS tunneling and identify and block data loss. DNS tunnelling allows the data of programs and protocols in DNS responses and queries to be encoded. DNS tunnelling is used by anti-virus and anti-malware programs to obtain signatures to update virus definition lists. While this use of DNS tunnelling is legitimate, malicious actors can similarly use DNS tunnelling to hide outbound traffic – communications between malware and C2 servers or to hide the exfiltration of data. Many organizations do not monitor for this type of traffic, so it can be difficult to detect data loss and malware communications. To help customers identify this malicious traffic, Cisco has incorporated the new DNS tunneling VPN as a security category within Umbrella. Commercial DNS tunneling VPN services can be used to mask or hide traffic as DNS queries,...

Read More
New TitanHQ Partnership Sees Enterprise Anti-Spam Solution Pushed Throughout Middle East
Jan03

New TitanHQ Partnership Sees Enterprise Anti-Spam Solution Pushed Throughout Middle East

TitanHQ has announced a new partnership with Middle-East based cybersecurity firm Zservices. The new collaboration will see TitanHQ’s enterprise anti-spam solution – SpamTitan – pushed to large organizations based in the Middle East, Africa, and India. The new partnership deal was announced during Enterprise Ireland’s trade mission to the Kingdom of Saudi Arabia and the United Arab Emirates. TitanHQ was formed in 1999 in Galway, Ireland and has fast grown into a global cybersecurity solution provider with more than 75 partner offices worldwide. Over almost 20 years, TitanHQ has developed a deep understanding of the complex threat landscape and has developed a range of cybersecurity solutions to protect organizations’ networks from increasingly sophisticated web and email-borne threats. TitanHQ has enjoyed tremendous global success with its anti-spam and web filtering solutions. The affordable, subscription-based security solutions are powerful tools that keep enterprise networks secure from web and email-borne threats. TitanHQ’s SpamTitan, WebTitan, and ArcTitan...

Read More
Web Security Gateway Updated by Barracuda
Nov22

Web Security Gateway Updated by Barracuda

Barracuda Networks has announced new updates have been released for its Web Filter Gateways (version 11.0) that provide greater protection from advanced threats and ransomware. Customers can now benefit from Barracuda’s cloud-based microservice – Advanced Threat Detection – which provides greater protection from targeted attacks, including ransomware, thanks to integration with Barracuda Web Filter Gateways. The latest models of the Barracuda Web Security Gateway – models 610 and above – now include dedicated SSL acceleration hardware to speed up SSL inspection of encrypted web traffic. As more sites move to HTTPS, including those created by threat actors, it is essential for encrypted traffic to be inspected since these encrypted connections are now often used to hide inappropriate or malicious content. However, SSL inspection can put a strain on network performance as it is resource intensive. The new SSL acceleration hardware improves performance, doubling the speed of SSL inspection. The Web Filter Gateways now integrate seamlessly with Barracuda NextGen firewalls and...

Read More
Secure Mobile Access 1000 Series OS 12.0 Launched by SonicWall
Nov16

Secure Mobile Access 1000 Series OS 12.0 Launched by SonicWall

As more businesses take advantage of remote workers, and the use of mobile devices grows, businesses seek solutions that provide an equivalent level of protection for remote and mobile workers as can be achieved within an organization’s facilities. SonicWall’s answer is the Secure Mobile Access (SMA) solution which allows security policy enforcement for mobile and remote workers. This week, SonicWall announced it has launched an updated version of its Secure Mobile Access 1000 Series OS. Version 12.0 includes several enhancements to improve security for remote and mobile users, regardless of the data types accessed or devices used to connect to cloud and on-premise resources. The solution offers enforced SSL VPN to essential applications, data and resources regardless of device type or operating system, with access granted only to trusted users with access rights determined by the health metrics of the connecting device and its location. The solution allows up to 20,000 connections per appliance and large enterprises can combined appliances to provide hundreds of thousands of...

Read More
Millennials Pose Significant Risk to IT Security, Reports Forcepoint
Oct26

Millennials Pose Significant Risk to IT Security, Reports Forcepoint

The results from a recently published Forcepoint survey shows millennials are placing the security of their organizations at risk by engaging in risky behaviors. The survey showed millennials were more likely to take short cuts to improve productivity, even though those behaviors placed security at risk. Forcepoint says action needs to be taken now to prevent the attitudes and behaviors of the younger generation from taking hold, especially in government organizations. The failure to address security issues could place U.S government IT systems in jeopardy. The study was conducted on 670 individuals and assessed attitudes and behaviors that increased the risk of cyberattacks, malware infections, and data breaches. The survey showed that millennials were regularly using unsecured WiFi networks for work without the use of VPNs. Password sharing was common, as was the belief that cybersecurity was an issue for IT departments to deal with. The survey suggests millennials believe they are well educated in cybersecurity matters and are confident about their level of security awareness....

Read More
TigerText Launches TigerFlow: A Clinical Communications Platform for Value-Based Care
Oct20

TigerText Launches TigerFlow: A Clinical Communications Platform for Value-Based Care

TigerText, the leading secure messaging platform provider for the healthcare industry, has announced the launch of Tigerflow: A new enterprise-wide clinical communications platform for healthcare providers.  TigerFlow has been developed to help healthcare organizations streamline communications with care teams and provide physicians, nurses, and support staff with easy access to actionable information through a single mobile-friendly ecosystem. The workflow-centric platform has data integration capabilities allowing information that would normally only be accessible through disparate workstations to be accessed by a wide range of healthcare professionals through their mobile devices, naturally with appropriate access controls to ensure only individuals authorized to view the information are granted access. The new platform incorporates a range of functions designed to accelerate adoption, reduce operational costs, raise productivity of the workforce and improve patient outcomes. The platform can integrate with clinical electronic medical record systems and features intelligent...

Read More
TitanHQ Protects McDonalds Restaurants from Malicious Email Messages
Oct15

TitanHQ Protects McDonalds Restaurants from Malicious Email Messages

TitanHQ has announced a new partnership with McDonalds (Phillipines) to protect employees from phishing attacks and emails used to spread malware and ransomware infections. TitanHQ has now completed rolling out its award-winning anti-spam solution – SpamTitan – and is now protecting McDonalds employees across the 500+ McDonalds restaurants throughout the Philippines. While international law enforcement operations have successfully taken down major spamming botnets and there has been a reduction in spam messages as a result, spam email remains a major attack vector. In fact, figures from the Anti-Phishing Working Group (APWG) show that phishing attacks are on the increase. APWG recently announced that there are now more phishing attacks taking place than at any other time in history. While phishing and other malicious emails used to be relatively easy to identify, cybercriminals have added a new level of sophistication to their phishing attacks. It is becoming increasingly difficult for employees to identify phishing emails; therefore, a technological solution is required to prevent...

Read More
GFI Software Launches Customer Loyalty Program
Sep01

GFI Software Launches Customer Loyalty Program

The email archiving and cybersecurity solution provider GFI Software has announced it has launched a new customer loyalty program called GFI Prime. Customers qualifying for GFI Prime will be given benefits as a reward for choosing GFI Software as their cybersecurity or email archiving partner and will be able to select at least one additional product from the GFI Software range and install and use the solution free of charge. The program rewards customers who have been using qualifying GFI Software products for more than a year. From September 1, 2016, customers qualifying for the GFI Prime loyalty program will be able to install one additional GFI software product immediately. When customers take out a new plan over multiple years, or renew a multi-year license or subscription, they will be allowed to install an additional GFI Software product without charge. GFI Software notes that the additional products will continue to be provided free of charge as long as licenses or subscriptions to qualifying GFI Prime products continue to be renewed. Existing customers can check...

Read More
EdgeWave Secures WiFi Network at 2016 US Open Tennis Championship
Aug29

EdgeWave Secures WiFi Network at 2016 US Open Tennis Championship

The La Jolla, CA-based email and web security firm EdgeWave has announced it has been selected as the cybersecurity partner at for this year’s US Open Tennis Championship at Flushing Meadows, NY and will be providing the technology to keep the tournament’s WiFi networks secure. Today, sports fans expect to be provided with WiFi access at sports events, yet it is important for event organizations to ensure that the Internet can be accessed securely and acceptable usage policies are enforced. That means blocking access to undesirable content such as pornography and webpages that are known to contain malware. This is the ninth consecutive year that EdgeWave has been selected to secure mobile Internet access for the US Tennis Association (USTA) at the U.S Open Championship. This year, the USTA WiFi network will be available to more than 750,000 fans, athletes, and sports reporters who will be assured of a secure connection and provided with high-speed Internet access. The USTA Billie Jean King National Tennis Center has an expansive mobile Internet infrastructure and is one of the most...

Read More
Securly Simplifies the Deployment of Cloud-Based Web Filters
Aug10

Securly Simplifies the Deployment of Cloud-Based Web Filters

There are several issues associated with appliance-based web filters. The cost of the appliance, the lack of scalability, problems with deployment, and the bottlenecks they can create when bandwidth-heavy applications are used or streaming services are being accessed by multiple users. These problems have seen many organizations turn to cloud-based filtering solutions. Cloud-based web filters require no hardware, are highly scalable, easy to deploy, and have the same level of granular control as their appliance-based counterparts. Since no expensive hardware is required, they can also offer significant cost advantages over appliance-based web filters. One disadvantage of cloud-based filtering is that it is often necessary to speak to customer service teams to implement the solution. Many organizations struggle to configure the solution on their own. Since customer service teams are usually busy, this can delay the implementation of a cloud-based web filter. Securly is now offering a solution. An entirely self-servable cloud-based web filter that can be set up through a browser...

Read More
SafeDNS Enhances Web Filter to Improve Detection of Malicious Resources
Aug01

SafeDNS Enhances Web Filter to Improve Detection of Malicious Resources

SafeDNS, a provider of web filtering solutions for home and business users, has launched a new version of its platform featuring new proprietary technology that has significantly improved the detection of malicious websites. Since the new technology was implemented, detection of malware and other malicious websites and webpages by SafeDNS has increased by 66%. The solution is now able to accurately detect 98% of malicious websites. Many web filtering solutions rely on blacklists of known malicious websites to determine whether access to page content should be granted. Unfortunately, solutions that only rely on blacklists fail to block a large percentage of phishing websites and sites containing malware and exploit kits, as there is often a significant delay between the creation of a malicious website and its inclusion on a blacklist. The new SafeDNS system places less reliance on static lists and instead maintains its own list of websites based on its own analyses of sites. Multiple new methods of assessing websites have been incorporated into the latest version of the platform...

Read More
Forcepoint Introduces New Technology to Secure Connections for Roaming Workers
Aug01

Forcepoint Introduces New Technology to Secure Connections for Roaming Workers

IT teams may be able to secure their wired and wireless on-premises networks, although it is much harder to secure users’ connections to the Internet when they are outside the corporate network and connect to the Internet via wireless hotspots. Organizations with a high percentage of remote or mobile workers often struggle to secure employees’ devices and provide secure, reliable access to data via third-party networks and public Wi-Fi hotspots. A highly mobile workforce is now becoming the norm with more workers now accessing networks remotely, and that calls for technological solutions to ensure devices and data remain secure.  Unfortunately, while many cloud-based security solutions can be deployed to reduce risk, many do not give IT security teams visibility in the actions taken by remote workers. Many solutions also mask the users’ true locations, which means it is not possible to access localized content and neither enforce geofencing controls. Forcepoint has now developed a solution that helps organizations improve security for a mobile workforce and ensure visibility into...

Read More
New Blue Coat Appliance Gives Organizations Better Visibility into Encrypted Traffic
Jul31

New Blue Coat Appliance Gives Organizations Better Visibility into Encrypted Traffic

Malicious actors are increasingly using SSL traffic to hide malware according to security researchers at Blue Coat Systems. The use of SSL/TLS encrypted sites is growing due to concern about the privacy of website visitors. While SSL/TLS offers increased security, it also gives malicious actors the opportunity to hide malware, command and control center communications, and data exfiltration. The threat is rising at an alarming rate. Blue Coat researchers identified 58 times as many SSL-cloaked C&C channels and 200-fold rise in C&C servers using SSL in 2015. While organizations have implemented URL filtering and secure web gateways to protect their networks from malware, many solutions do not have visibility into encrypted traffic. Many organizations find that security appliances that can decrypt and re-encrypt SSL traffic are not without their issues. The capacity of some appliances and filtering solutions reduces by as much as 80% when configured to inspect SSL traffic, meaning SSL inspection must be turned off or capacity needs to be expanded. Blue Coat’s solution is a...

Read More
TigerText Receives HITRUST CSF Certification
Jul28

TigerText Receives HITRUST CSF Certification

Secure healthcare messaging platform provider TigerText has achieved CSF Certification from the Health Information Trust Alliance (HITRUST). TigerText is the first vendor in its class to earn HITRUST CSF certification. HITRUST CSF was developed to help organizations in the healthcare sector certify that they have implemented the necessary privacy and security controls in compliance HIPAA and HITECH legislation, in addition to globally recognized standards and frameworks developed by NIST, ISO, PCI, FTC, and COBIT. Since the HITRUST CSF was developed it has fast become the most widely-adopted security framework in the U.S. healthcare industry. In order for organizations to earn HITRUST CSF certification they must be able to demonstrate that they meet key healthcare regulations covering the protection of sensitive healthcare information and that they are effectively managing risk. As Ken Vander Wal, Chief Compliance Officer at HITRUST, explains “The HITRUST CSF has become the information protection framework for the healthcare industry, and the CSF Assurance program is bringing a new...

Read More
Smoothwall Releases Glamis Product Update
Jul05

Smoothwall Releases Glamis Product Update

The latest product update from Smoothwall – named Glamis – sees several changes to improve speed and usability of its system, with key changes made to safeguarding, malware detection, and reporting. New filtering categories have been added to the Guardian web filter engine covering ‘APIs and web libraries’ (excluding CDNs), and ‘Computing’. Computing covers the websites of tech companies, sites relating to programming languages, and news from the computer industry. Note that this category excludes computer games, which are covered by the online games and computer games categories. The web filter also sees Smoothwall change its malware detection engine to Bitdefender. Bitdefender often tops industry malware detection lists and was chosen for the excellent level of protection it provides and the comprehensive range of file types covered. Other advantages are an increased maximum file size that can be scanned (1GB). The update to the malware detection engine requires the downloading of Bitdefender signatures. This will happen automatically, but the download will take serval minutes to...

Read More
Securly Partners with Internet Watch Foundation and iKeepsafe
Jun29

Securly Partners with Internet Watch Foundation and iKeepsafe

Two organizations committed to making the Internet a safer place and removing and blocking illegal web content are the Internet Watch Foundation and iKeepSafe. This week, the web filtering solution provider Securly has announced that it has partnered with both organizations and the Securly web filter has been verified as meeting strict standards for Internet control. The Internet Watch Foundation (IWF) is a UK based charity committed to eradicating child pornography from the internet and making it harder for individuals to access such content. The charity works closely with law enforcement agencies and ISPs to ensure that illegal images and videos are taken down and permanently removed from the Internet. The charity is also committed to bringing the individuals responsible for uploading the content to justice. IWF maintains a blacklist of websites and webpages discovered to be hosting images of child abuse or child pornography, which can be applied to web filtering solutions to ensure such content cannot be accessed. Securly has incorporated the IWF blacklist into its own blacklist...

Read More
Symantec Announces Acquisition of Web Security Firm Blue Coat in $4.65 Billion Deal
Jun12

Symantec Announces Acquisition of Web Security Firm Blue Coat in $4.65 Billion Deal

In a deal worth approximately $4.65 billion in cash, Symantec will acquire the web security firm Blue Coat Inc.  The Boards of Directors at both companies have approved the acquisition and the deal is expected to go through in Q3, 2016. Blue Coat currently has the largest share in the web security market and has GAAP revenue for the fiscal year ending on April 30, 2016 of $598 million and non-GAAP revenue of $755 million. The company has developed an extensive portfolio of technologies and has developed a Cloud Generation Security platform that is being used by more than 15,000 customers. The company continues to develop new products and expand its customer base and has achieved year-on-year growth of 17%. Under the deal, Blue Coat Chief Executive Officer Greg Clark will become the CEO of Symantec and will join the Symantec Board. The acquisition will help Symantec maintain is position as a leader in the field of cybersecurity, with its customers protected from a much wider range of cyberthreats. Symantec will be able to offer best-in-class protection, detection, and remediation of...

Read More
TigerText Announces Collaboration with Honeywell
Jun02

TigerText Announces Collaboration with Honeywell

TigerText, the leading provider of secure text messaging solutions for the healthcare industry, has announced that users of the Honeywell’s new Dolphin™ CT50h smartphone can now use the TigerText secure messaging app. TigerText has been working closely with Honeywell to develop a customized version of its app which can be downloaded onto the Dolphin smartphone. The new version of the TigerText app works with the next-generation scanner on Honeywell’s Dolphin™ CT50h smartphone, which can be used to verify patients’ identities. TigerText has incorporated its bot technology which allows healthcare data to be pulled directly from healthcare providers’ electronic medical record systems. Physicians can use the app to retrieve critical up-to-date health information about patients’ medications by scanning barcodes with the Dolphin smartphone. The TigerText app allows physicians to obtain EMR data in real time, ensuring they can access all patient data including recent procedures and notes entered by all members of the care team. Having access to the most up-to-date patient information will...

Read More
TitanHQ Receives Red Herring Top 100 Europe Award
Jun01

TitanHQ Receives Red Herring Top 100 Europe Award

TitanHQ has picked up a ‘Top 100’ Award at this year’s Red Herring Europe Awards – one of the most prestigious awards for technology companies. The Red Herring Awards are an annual event where private technology ventures are honored for their innovation, potential, track record and financial performance. Each nominated company is comprehensively assessed on 20 criteria, including market footprint, quality of management, proof of concept, innovation and execution of strategy. While many awards recognize the potential of a company, the Red Herring panel of judges looks more deeply at a company, giving an unparalleled insight into the best technology vendors, not just their products by the ability to develop them into industry-leading offerings. The detailed reviews of each company mean the Top 100 Award winners list gives a clear view of the most innovative companies with the greatest potential, providing invaluable information on the hottest prospects for venture investors. This in depth look at the best of the best in the field of technology resulted in the potential of some of the...

Read More
TigerText Launches HealthBot Capable of Automating the Provision of Healthcare Information to Patients
May13

TigerText Launches HealthBot Capable of Automating the Provision of Healthcare Information to Patients

TigerText has launched a new secure, HIPAA-compliant, messenger service for web portals and mobile applications which automates a wide range of tasks that previously required the time of support staff. All too often patients face extended wait times when calling hospitals and other healthcare facilities and hold times in excess of 30 minutes are far from uncommon. Obtaining answers to questions and making routine appointments is rarely a quick process, causing considerable frustration for patients. Patient web portals are a convenient way of communicating with patients more efficiently, yet healthcare staff are still required to man the web portals. Many of the questions asked by patients via web portals can be easily handled by a messenger bot. Automating these services can reduce patient waiting times and provide patients with instant answers to their questions. With the cost of healthcare expected to increase by 5.8% each year, healthcare organizations need to find new ways to improve efficiency and lower operational costs. Messenger bots can allow patients to receive...

Read More
U.S. Cellular Customers Can Now Take Advantage of Secure Text Messaging from TigerText
Apr18

U.S. Cellular Customers Can Now Take Advantage of Secure Text Messaging from TigerText

Customers of U.S. Cellular – the fifth-largest full-service wireless carrier in the United States – can now take advantage of secure text messaging from TigerText in order to protect confidential conversations and data. According to a press release issued earlier today by the Santa Monica based secure messaging provider, individual and corporate customers of U.S. Cellular will be able to take advantage of TigerText´s secure text messaging technology to protect private and restricted conversations with the security and level of confidentiality required by legal regulatory standards such as HIPAA, SOX and FINRA. TigerText is a leading provider of secure, real-time messaging solutions in many regulated industries. Committed to keeping mobile communications secure, private and impermanent, TigerText has been rated by KLAS as the most widely-adopted solution in the healthcare industry, with four of the top five largest for-profit healthcare systems in the country relying on the company´s secure messaging solutions to keep communications safe, improve workflows and comply...

Read More
SafeDNS Joins Friendly WiFi Initiative
Apr12

SafeDNS Joins Friendly WiFi Initiative

Parental control and web filtering company SafeDNS has been accredited as ‘Wi-Fi Friendly’ and is now an approved vendor of web filtering solutions that ensure minors can access the Internet safely and securely. The Friendly WiFi Initiative is the world’s first public Wi-Fi accreditation scheme, which was devised by RDI (UK) Holdings in conjunction with the UK government and the UK Council for Child Internet Safety. The aim of the initiative is to encourage businesses that offer Wi-Fi access to their customers, clients, and patrons to ensure only family friendly websites can be accessed via their networks. This is of particular importance in locations where minors may visit, such as coffee shops, restaurants, venues, hospitals, and libraries. To be accredited, an organization’s web filtering solution is subjected to stringent tests to ensure it is effective at blocking access to obscene images and other adult and undesirable content. Organizations that pass the assessment can display the Friendly Wi-Fi symbol. Businesses that use a Friendly Wi-Fi Approved Vendor’s solution can...

Read More
TigerText´s Latest Update Will Help Deliver Faster, High Quality Healthcare
Mar23

TigerText´s Latest Update Will Help Deliver Faster, High Quality Healthcare

TigerText has released a number of new features on its secure messaging solution that will help deliver faster, high quality healthcare in compliance with HIPAA. According to Brad Brooks – the company´s co-founder and president – the new features in the latest Spring 16 TigerText release are the result of listening to and translating customer feedback into useful and relevant updates. He explained that through TigerText´s “voice of the customer” program, requests for new features were shared regularly with the product development team, who prioritized the most relevant requests and brought them to market. Among the innovative features in the latest TigerText release: • A new self-updating desktop app with built-in alerts will allow any authorized user to access TigerText from a PC or Mac. • Messages will automatically be auto-forwarded to a colleague when a user´s app is in “Do Not Disturb” mode. • Priority messages will now remain at the top of the recipient´s inbox and emit a distinctive ring for instant differentiation. • TigerText users will now be able to set up...

Read More
Smoothwall Framlingham Update Introduces Google as a Directory Service
Mar08

Smoothwall Framlingham Update Introduces Google as a Directory Service

Smoothwall has released its Framlingham update, making several changes to authentication, implementing an easier way to filter the Internet on Chromebooks, as well as enhancements to safeguarding and reporting. Thanks to a new directory type, it is now possible for filtering on Chromebooks to be based on Google Apps memberships without having to use GADS to link an Active Directory to Google. System administrators can map Smoothwall groups to Google groups allowing Smoothwall content filtering policies to be applied to Google groups. Synchronization does not occur automatically when a user logs in via their Google account, instead this is performed on demand via the click of a button. In this release a single domain can be set up although, in future updates, Smoothwall will add support for subdomains to allow group mapping by organizational units. This release also sees improvements made to Connect for Chromebooks, removing several of the setup steps. It is now optional for verification checks against the Google authentication service to be performed, although the verification...

Read More
SpamTitan Technologies Awarded Ninth VB+ Award
Mar04

SpamTitan Technologies Awarded Ninth VB+ Award

SpamTitan Technologies is celebrating its ninth VBSpam+ award – and thirty-fifth VB award overall – for a high performance in blocking spam emails. Virus Bulletin is a security information service that conducts independent testing on anti-malware and anti-spam solutions. It only distributes VB awards to vendors whose software achieves excellence in preventing web-borne threats – VBSpam+ being the highest award the organization can bestow. The most recent Virus Bulletin anti-spam test took place in January, with sixteen anti-spam solutions undergoing rigorous testing. For the fourth time in a row, SpamTitan Technologies´ anti-spam solution blocked more than 99.9% of spam and, for the third time in a row, it did so without any false positives. Martijn Grooten – responsible for conducting Virus Bulletin´s comparative reviews – commented on the importance of spam filters and how ‘spam filters make the email lives of users a lot easier – and a lot more secure”. Speaking about the performance of SpamTitan Technologies´ anti-spam solution, Martijn said...

Read More
Cyren Collects Cyber Defense Magazine Award for Web Security Platform
Mar04

Cyren Collects Cyber Defense Magazine Award for Web Security Platform

The leading cybersecurity magazine – Cyber Defense Magazine – has announced the winners of the 2016 CDM Awards program, with Cyren Web Security platform named 2016 Best Anti-Malware Solution. Cyren Web Security is a Software-as-a-Service (SaaS) platform that combines web policy control with anti-malware protection, helping businesses to control the categories of websites employees are allowed to access in the workplace and protecting users and endpoints from phishing, malware, ransomware, and other web-based threats. The cloud-based solution has been developed to be quick and easy to deploy, and being cloud-based, requires no software downloads or hardware purchases. The subscription-based DNS filtering solution prevents end users from visiting known and unknown malicious URLs, decrypts, analyzes, and re-encrypts SSL traffic, and blocks outbound calls to threat actors’ C2 servers. Cyren now protects more than 600 million end users from web-based, mobile, and email-based threats and can name major companies such as Google, Dell, Microsoft, and McAfee among its clients. Cyber Defense...

Read More
TigerText´s Latest Collaboration with Box will Accelerate Consults and Diagnoses
Feb29

TigerText´s Latest Collaboration with Box will Accelerate Consults and Diagnoses

The latest collaboration between TigerText and Box adds DICOM imaging to the types of files that can be shared between medical professionals on the TigerText platform. Digital Imaging and Communications in Medicine (DICOM) is a healthcare industry standard for managing, storing, printing and transmitting information associated with medical imaging that has a file format definition designed to eliminate data inoperability barriers. DICOM facilitates the integration of servers, workstations, scanners, printers and network hardware from various manufacturers into a universal picture archiving and communication system that is widely used by hospitals and other medical facilities to share X-rays, CT scans and ultrasounds. Now, due to the collaboration between TigerText and Box, medical professionals will be able to collaborate on DICOM images securely and with no risk of HIPAA compliance issues – accelerating consults and diagnoses, and enhancing patient care. Improving Communications across the Healthcare Continuum TigerText first announced the integration of secure messaging...

Read More
TigerText´s Secure Messaging Apps Available for Salesforce Health Cloud
Feb29

TigerText´s Secure Messaging Apps Available for Salesforce Health Cloud

TigerText has announced that the integration of its secure messaging apps will be available to extend the capabilities of Salesforce Health Cloud. Salesforce Health Cloud is a patient relationship management solution that enables healthcare providers to gain a complete view of the patient using data from electronic medical records (EMRs) and wearable electronic health apps. The concept behind the management solution is that it enables greater patient engagement across their caregiver networks, enabling healthcare providers to make better informed care decisions. The platform also enables healthcare providers to safely and securely manage patient data. With the addition of TigerText´s secure messaging apps, Salesforce Health Cloud customers will now be able to embed the TigerText secure messaging service in their Health Cloud portals, enabling healthcare providers to conduct HIPAA-compliant conversations for streamlined care coordination and patient handoffs. Communication the Key to Effective Care Delivery According to Joshua Newman – Chief Medical Office at Salesforce...

Read More
TitanHQ Launches Web Filtering Solution for Hospital Wi-Fi Networks
Feb17

TitanHQ Launches Web Filtering Solution for Hospital Wi-Fi Networks

TitanHQ – a world leader in email and web security solutions – has launched a DNS-based Web filtering solution for hospital Wi-Fi networks. Wi-Fi in hospitals has been acknowledged as a feature that increases patient satisfaction and has been associated with faster patient recuperation. Certainly providing patients with a means of communicating with their families via email and social media makes their stay more bearable. However, providing unfiltered Wi-Fi access to patients can have negative consequences. Patients that spend all day live streaming sports events can eat up bandwidth – preventing other patients from being able to access the Internet at all. Patients can access inappropriate web content in eyeshot of other patients or minors, and – potentially a more serious consequence – is the installation of malware and viruses that may not only infect the user´s device, but also the entire Wi-Fi network. TitanHQ has developed a solution for these potential issues – WebTitan Cloud for Wi-Fi. With Wi-Fi filtering for hospitals, administrators...

Read More
New Version of Rocket Web Filter Released by LightSpeed Systems
Feb16

New Version of Rocket Web Filter Released by LightSpeed Systems

Lightspeed Systems has announced version 3 of its Rocket web filter has now been released. The web filter is one of the leading web filtering solutions used in education to block access to malicious websites and sites containing inappropriate content for minors. The new version of the web filter includes a redesigned, sleek interface for ease of use, a redesigned administrator dashboard, and a wide range of new features designed to improve usability and school network management. The Rocket web filter is an appliance-based web filtering solution that runs on Lightspeed Systems’ proprietary technology, with options for cloud-based filtering also available. The web filter was developed first and foremost for use in education and soon become the go to company for web filtering, thanks to robust filtering controls that do not overblock web content. Version 3 of the Rocket Web Filter improves on its predecessor by increasing filtering speed and improving SSL handling. The latest version has better scalability and also now includes new reporting options, providing traffic reports in real...

Read More
Secure Healthcare Messaging Vendors Assessed by KLAS
Jan29

Secure Healthcare Messaging Vendors Assessed by KLAS

Which is the top vendor for HIPAA-compliant secure messaging? It depends. Established players and up and coming companies have recently been assessed by KLAS. The independent research company has rated the current options available to healthcare providers looking to improve communication between care teams without falling afoul of HIPAA Regulations. The cost of healthcare provisioning is rising, placing increasing pressure on healthcare providers to reduce operational costs, improve efficiency, and increase the productivity of healthcare employees. Currently many physicians, nurses and other healthcare professionals are forced to use slow and inefficient communications systems, resulting in many hours of wasted time each week per employee. The use of SMS text messages would solve many of these problems. The communication channel is fast, convenient, and practical, but SMS messages are unsecure. This poses a problem for healthcare providers and other HIPAA-liable entities. HIPAA Rules prohibit the transmission of Protected Health Information (PHI) via SMS as the messages can all too...

Read More
Fortinet Identifies Further Products Vulnerable to FortiGuard SSH Backdoor
Jan22

Fortinet Identifies Further Products Vulnerable to FortiGuard SSH Backdoor

products, which could be used to gain administrative control of certain devices. The backdoor existed in the FortiOS operating system in versions 4.x up to 5.0.7. The FortiGuard SSH (Secure Shell) backdoor had not been intentionally added, instead it was a flaw in its management system which used an undocumented account and hard-coded password. Fortinet reports that the flaw was due to “A feature that was designed with the intent of providing seamless access from an authorized FortiManager to registered FortiGate devices.”  This was therefore different to the security issues with Juniper Networks devices that had a backdoor inserted by a malicious actor. While an independent researcher discovered the flaw, Fortinet said that its own security team had identified the problem and patched it in 2014. FortiOS 4.3.17 and FortiOS 5.0.8 were patched in 2014, and all products running FortiOS versions 5.2 or 5.4 were not vulnerable to the exploit. While the issue appeared to have been addressed, the publication of the exploit prompted Fortinet to investigate other products to determine...

Read More
TigerText Launches Healthcare Pager and Fax Replacement
Jan15

TigerText Launches Healthcare Pager and Fax Replacement

TigertText has announced the release of two new communication solutions for healthcare providers. The two new products have clear potential, and could convince many healthcare providers to start phasing out pagers and faxes. The new products, named TigerPage & TigerFax, are aimed at healthcare providers that would like to transition to a more secure, HIPAA-compliant method of communication but who are reluctant to give up the communication tools they have relied on for decades. Rather than totally replacing pagers and faxes, the new solutions allow them to continue to be used. If fact, the speed and efficiency that pages and faxes can be received and responded to is greatly improved. Rather than carrying a pager and a Smartphone, healthcare workers can have pages and faxes sent directly to their Smartphone. Healthcare Providers Reluctant to Relinquish the Pager Pagers and faxes have been an essential communication tool for the healthcare industry for decades, yet despite reliable, HIPAA-compliant communication systems being available for some time, healthcare providers are...

Read More
The Slow Pace of Technology Adoption in Healthcare Explained
Jan14

The Slow Pace of Technology Adoption in Healthcare Explained

When it comes to implementing new technology, the healthcare industry lags behind every other industry sector. It is a well-known fact that the industry appears to resist change, even when those changes stand to significantly benefit patients. In an age of Smartphones, tablets, and the Internet of Things, many people would be amazed to find out that archaic communication methods such as pagers and faxes not only still exist, but are extensively used throughout the healthcare industry. In some cases, the new technology now being introduced by healthcare providers was first introduced in other industry sectors many years ago. There are very good reasons why the pace of change is so much slower in the healthcare industry rather than, say, the financial sector or manufacturing industry. Itamar Kandel, Chief Strategy Officer of TigerConnect, is well aware of the slow pace of change. During his time working with healthcare organizations at VERITAS Software and more recently at TigerConnect, he discovered the reasons why adoption of new technology is slow, even when technology can clearly...

Read More
Raytheon|Websense Rebrands as Forcepoint
Jan14

Raytheon|Websense Rebrands as Forcepoint

Raytheon|Websense has recently been rebranded. From January 14, 2016 the company will be known as Forcepoint. Forcepoint combines the cybersecurity products of Websense, which was acquired by Raytheon in May 2015, Raytheon – a major U.S. defense contractor, and the next generation firewall solutions of Stonesoft and Sidewinder, which were acquired from Intel Security this month. Forcepoint is a joint venture between Raytheon and Vista Equity Partners. The acquisitions which allow the company to provide a wide range of cybersecurity solutions to address the ever-evolving threat landscape through the transformative technologies of the cloud, mobility and IoT. The company is providing a cloud-centric platform that will safeguard data, networks, and end users. The combination of all services under the same brand will help the firm eliminate some of the inefficiencies of managing separate collections of cybersecurity products. The products of all companies will be combined into a platform solution that offers protection from internal and external threats, combining next generation...

Read More
Smoothwall Web Filter Edinburgh Update Make Use Easier
Jan12

Smoothwall Web Filter Edinburgh Update Make Use Easier

have also been made to the administrative User Interface to make it more aesthetically pleasing. Users will notice several changes to the layout of the administrative User Interface. The main navigation menu has been moved to the top of the page, and the menu system has been changed to allow users to view and navigate between all items in the section showing users exactly where they are in the product. In addition to making navigation easier, the changes will support future product updates. Context-sensitive help is also displayed on the page, providing hints and tips while performing certain actions. When viewing the filtering reporting sections, users will now be able to see the amount of time a user has spent browsing a particular domain. Certificate management has been improved with the creation of a new certificate management page, making it easier for users to create, delete, import, and export certificates. Certificates are included for MITM for decrypting HTTPS sessions to enable content to be filtered, for user facing HTTPS services, and Global Proxy. Establishing a single...

Read More
TigerText Launches HIPAA Compliant Secure Texting App for Desktops
Dec18

TigerText Launches HIPAA Compliant Secure Texting App for Desktops

TigerText, the leading provider of secure text messaging solutions for the enterprise, has announced the launch of its latest initiative, TigerText Anywhere: A HIPAA compliant secure texting app for desktop computers. TigerText’s HIPAA compliant text message platform is already hugely successful. To date, more than 250,000 healthcare professionals have adopted the secure messaging platform. The company now counts 4 out of 5 of the largest for-profit healthcare systems in the United States among its clients. According to TigerText co-founder and CEO, Brad Brooks, “TigerText has reached the scale necessary to truly improve the quality of care our healthcare customers deliver, while at the same time reducing the costs to do so.” In fact, the potential cost savings from using the HIPAA compliant secure texting app are considerable, as Brooks explains. “By connecting electronic health records, critical alerts, real time shift data, and other essential components of patient care and productivity, we think that secure, real-time messaging could save the healthcare industry $30-$50 billion...

Read More
WebTitan Gains Accreditation as Friendly Wi-Fi Approved Vendor
Nov11

WebTitan Gains Accreditation as Friendly Wi-Fi Approved Vendor

WebTitan´s Wi-Fi filtering solution has been considered to be of a sufficiently suitable standard to gain accreditation in the UK´s Friendly Wi-Fi scheme. In 2013, the UK´s Prime Minister – David Cameron – announced that a commitment had been received from the UK’s main Wi-Fi vendors that their standard public Wi-Fi service will automatically filter the Internet to comply with the Internet Watch Foundation “watch list” and block access to pornography. The Friendly Wi-Fi Scheme was subsequently created in collaboration with the UK Council for Child Internet Safety (UKCCIS). The motive behind the Scheme is to prevent children and young adults from accessing inappropriate pornographic material themselves and limit accidental exposure to inappropriate material that nearby adults might be viewing in public. “Friendly Wi-Fi” accreditation is given by the Registered Digital Institute to vendors and businesses who commit to protecting minors from exposure to inappropriate web content. TitanHQ has just announced that the company´s WebTitan for Wi-Fi has been accredited by...

Read More
LightSpeed Systems Releases New Device Management Bundle for Windows
Nov10

LightSpeed Systems Releases New Device Management Bundle for Windows

Lightspeed Systems has launched a new Device Management Bundle for Windows that simplifies the management of Windows and non-Windows devices. The new package incorporates web filtering, mobile device management, and classroom management in one convenient package. The system was developed to help administrators manage the increasing number of mobile devices in use in educational institutions, control what those devices can be used for, and apply security controls in case of loss or theft. All controls can be easily set from a single administrator’s panel, with the option of securely delegating certain responsibilities to other users to ease the administrative burden. Through the control panel it is possible to view the screens of all users, set secure filtering policies, set testing policies, manage device features, and apply individual device controls to suit all users, including staff and students. Lightspeed Systems worked closely with Microsoft when developing the Management Bundle for Windows to ensure full compatibility with Windows 10, Microsoft Office 365, and Microsoft...

Read More
TigerText Comes Top of the KLAS for Secure Messaging in Healthcare
Oct28

TigerText Comes Top of the KLAS for Secure Messaging in Healthcare

TigerText has been named as the most widely adopted secure messaging solution in the healthcare industry in a recently released report by KLAS Resources. According to the KLAS report – “Secure Messaging 2015: First Look at Who Providers are Considering and Why” – TigerText not only had the biggest market share among secure messaging vendors, but also the biggest “mindshare” – with the company being considered by healthcare organizations as a provider of secure messaging more often than the next top six competitors combined. KLAS researchers attributed the company´s market position to the “high speed-to-value proposition offered by TigerText” and validated its conclusions by publishing selected comments from survey respondents: On Care Coordination “TigerText is our care coordinators’ lifeline. They would all walk out the door if we took it away from them. They are able to get the doctors engaged and take action, make decisions, and provide advice because the doctors don’t mind responding to TigerText messages.” “We use TigerText in a couple of different ways. In...

Read More
Cisco Announces Acquisition of OpenDNS
Aug27

Cisco Announces Acquisition of OpenDNS

Cisco has announced it has acquired the DNS and cybersecurity firm OpenDNS, boosting Cisco’s cloud-based security portfolio. OpenDNS was formed in 2006 as a consumer DNS company, with the firm moving into the realm of cybersecurity in 2012 with the launch of the network security service OpenDNS Umbrella. The firm developed its product portfolio and usability of its Umbrella to allow integration with any security product via the OpenDNS global security network. During the past three years, OpenDNS has partnered with some of the world’s biggest IT security vendors and its cybersecurity offerings are used by many of the world’s top enterprises. Cisco made its intentions to acquire OpenDNS known in June. Now, two months on, it has been announced that OpenDNS is now part of Cisco, although the acquisition process is not expected to close until the end of the first quarter of 2016. The acquisition makes perfect sense for Cisco, allowing the firm to rapidly expand its cloud-based security services and augment its already advanced threat detection capabilities, which now includes DNS-based...

Read More
Fortinet Launches Secure Cloud-Managed Enterprise WiFi Solution
Aug12

Fortinet Launches Secure Cloud-Managed Enterprise WiFi Solution

Fortinet has announced it has made several enhancements to its FortiCloud management system and has also introduced a new range of secure Wireless Access Points (APs) that can be managed entirely in the cloud. The updates and new line is part of the company’s drive to dominate the secure wireless networking market, which has been helped by the recent acquisition of Meru Networks: A leading supplier of wireless local area networks (WLANs) to the education, enterprise, hospitality, and healthcare industries. Wireless LAN solutions are convenient for organizations with facilities in multiple locations; however, deploying WLAN solutions is not without challenges. The architecture is often complex as networks need to be segregated, with separate networks used for guests and employees. Multiple WLAN controllers are often required, with separate security appliances also required, adding to both cost and complexity. The alternative is to use cloud-based WiFi solutions, and while there is now much more choice in this area, security remains a major concern. There are many security challenges...

Read More
SpamTitan Technologies Undergoes Rebranding Exercise – Emerges as TitanHQ
Aug11

SpamTitan Technologies Undergoes Rebranding Exercise – Emerges as TitanHQ

From today, SpamTitan Technologies – one of the world´s leading providers of email and web security solutions – will be known as TitanHQ. To support its continued evolution as a provider of email and web security solutions, SpamTitan Technologies has rebranded as TitanHQ. The company has had seen substantial growth over the past five years due to the release of new products, the introduction of cloud security services and through relationships with partners throughout the world. As the company continues to grow, its leadership has decided on the rebranding as part of its future plans. TitanHQ´s CEO – Ronan Kavanagh – said “As our customers’ needs have evolved so too has our product suite. We have added great new products and product brands such as SpamTitan, WebTitan and ArcTitan. The company continues to respond to consumer demand and this rebrand is part of this response. We now feel it is right to incorporate all of our great products under one umbrella brand which will allow us communicate one core message through one central platform to our customers”....

Read More
EdgeWave Collects Two Gold Awards for Email and Web Security Solutions
Jul15

EdgeWave Collects Two Gold Awards for Email and Web Security Solutions

The La Jolla, CA-based cybersecurity firm EdgeWave has collected two Gold Awards at Network Products Guide’s IT World Awards for Hot Companies and Best Products. Network Products Guide is a leading technology research and advisory guide and has been running its award program for 10 years. The awards cover the full spectrum of IT products in every facet of the IT industry and celebrate the best products and services currently on the market. This year’s awards were announced at a gala event in San Francisco on June 29. Businesses from all industry sectors are now being targeted by hackers who are using increasingly sophisticated methods to gain access to networks and data.  While anti-virus and anti-malware solutions still have their uses, the sophisticated methods of attack require more advanced security solutions to prevent the sabotaging of systems and theft of sensitive data. Two such solutions developed by EdgeWave were recognized at the Network Products Guide and both picked up gold awards. In the Best Email Security Product category, EdgeWave collected a gold award for its...

Read More
GFI Software Publishes New Study Evaluating Email User Habits
Jun24

GFI Software Publishes New Study Evaluating Email User Habits

GFI Software has published the results of its third annual study of the email habits of end users in the United States which has shown the positive and negative impacts of the widespread use of email in businesses and its impact on employees. The survey was conducted for GFI Software by Opinion Matters on 500 US workers from companies employing more than 500 individuals. One of the key findings of the survey is the ‘always-on’ culture is having a negative impact on employees, whose personal lives are being disrupted by work emails. Employees access emails on mobile devices and often view and respond to messages before and after work, at weekends, and during vacations. The problem is also getting worse. 6% more employees are now accessing and responding to work emails outside of working hours than last year. 74% of surveyed U.S. workers said they regularly check their work emails at weekends and 58% of employees said they are now checking work emails at least once a day outside of normal working hours. 54% said they have checked work emails while on vacation and 39% of survey...

Read More
Barracuda Improves Deployment Choices for its Web Filtering Solution
Jun17

Barracuda Improves Deployment Choices for its Web Filtering Solution

While many organizations choose a combined firewall and web filtering solution, in order to balance security with performance, many choose to keep both functions separate. Barracuda Networks has announced that it has now improved its web security deployment choices, allowing customers to choose an integrated firewall/web security solution or run both as separate appliances. “The recent enhancements made to Barracuda’s firewall and web security products allow customers to deploy best-in-class web security architectures, either integrated as a feature of their next-generation firewalls, or integrated as discrete firewall and web security appliances,” said Stephen Pao, GM Security, Barracuda. The Barracuda next generation firewall now has the capability to silently redirect traffic through the web filter without inline connections, with the feature made available on both the Barracuda Firewall and the Barracuda NextGen firewall. Organizations that run the firewall and web filter on separate appliances can gain several performance benefits, since there are different...

Read More
Fortinet Survey Reveals Wireless Network Biggest Concern in Enterprise IT Infrastructure
Jun03

Fortinet Survey Reveals Wireless Network Biggest Concern in Enterprise IT Infrastructure

Fortinet recently commissioned a survey on CISOs, CIOs, CTOs, and head of IT to discover current views on wireless security and the protections put in place by organizations to secure their wireless networks. The survey, conducted in May 2015 on 1,490 qualified IT decision makers, revealed wireless networks were the biggest area of concern and the weakest link in the security chain. From a security standpoint, wireless networks were ranked as the biggest concern by 49% of respondents, compared to the core network which was the biggest concern for just 29% of respondents. The remaining areas of concern were databases (25%), applications (17%) and storage (11%). Almost all of the CIOs that took part in the survey (92%) said insufficient wireless security was a concern. When asked about the security put in place to secure wireless networks, 37% of respondents said they do not even have authentication controls in place on their internal wireless networks. The level of concern therefore comes as no surprise. Further, while internal wireless networks have been set up for staff use, 43%...

Read More
Secure Text Message Service Improves Response Times at Chicago Cardiology Institute
May29

Secure Text Message Service Improves Response Times at Chicago Cardiology Institute

The Chicago Cardiology Institute, a leading healthcare provider offering treatment for cardiovascular and peripheral vascular diseases, has implemented a new secure text message service that allows its nurses, physicians and other healthcare staff to communicate in a timely and efficient manner, without running the risk of violating data privacy and security legislation. HIPAA Prohibits the Transmission of PHI over Insecure Networks   The Health Insurance Portability and Accountability Act (HIPAA) places a number of restrictions on healthcare providers to ensure patient privacy is protected and Protected Health Information (PHI) is secured. HIPAA does not permit the transmission of PHI over insecure networks; meaning pagers, Smartphones and other mobile devices cannot be used to communicate PHI, unless the data is first encrypted. Healthcare providers wanting to improve communication between care teams, and speed up the exchange of healthcare information, must implement a system to secure communications. One of the most efficient and easiest ways to do this is to use a secure text...

Read More
Fortinet Launches FortiGuard Mobile Subscription Service
May28

Fortinet Launches FortiGuard Mobile Subscription Service

Businesses that allow employees to use their own devices at work under BYOD schemes face challenges blocking threats from those devices. They lack visibility and often struggle to control mobile traffic. Wireless networks are becoming more popular in business environments and industry experts predict the popularity of wireless networks will continue to grow. Ultimately, wireless networks will dominate wired networks in enterprises. However, wireless networks pose security risks and security protections must be implemented to identity and block threats. Fortinet has now developed a solution that will improve both visibility and threat protection on wireless networks, especially for personally owned mobile devices used at work under BYOD schemes. The FortiGuard Mobile Security Service offers mobile malware protection and mobile application control for all Apple IOS and Android devices that connect to wireless networks. The FortiGuard Mobile Security Service offers threat protection through Fortinet’s global threat intelligence service, which supplies threat intelligence on both...

Read More
Raytheon Acquires Websense in $1.9 Billion Deal
Apr20

Raytheon Acquires Websense in $1.9 Billion Deal

Raytheon, a major U.S defense contractor, has announced it is to acquire Websense Inc from Vista Equity Partners in a deal reported to be worth $1.9 billion. The deal is expected to add an additional 20,000 commercial customers to Raytheon’s portfolio and is expected to close at the end of Q2, 2015. Over the past couple of years there has been a significant increase in cyberattacks on organizations of all sizes from SMBs to multi-national corporations. The increase in frequency of attacks and the level of sophistication of the attackers requires advanced defenses to be deployed to keep networks and data secure. The recent high-profile attacks have prompted many firms to commit more funds to cybersecurity. MarketsandMarkets has estimated there will be an increase of $60 billion in cybersecurity spending over the next four years, and Raytheon is poised to take advantage. Websense has developed Internet security technology for enterprises and governments to protect against web-based threats and block data theft and keep systems and endpoints free from malware. Those solutions will be...

Read More
Faster Delivery of Lab Test Results Achieved by Pathology, Inc.
Apr15

Faster Delivery of Lab Test Results Achieved by Pathology, Inc.

Privately owned pharmacies and laboratories are covered by HIPAA Rules, and they must therefore ensure that all Protected Health Information (PHI) stored and transmitted, is appropriately secured, with the security measures used dictated by the standards laid down in the HIPAA Security Rule. The privacy of patients must be assured at all times. Highly sensitive health information, such as medical test results, could cause patients to come to harm if accidentally disclosed to the wrong individuals. Efforts should therefore be made to ensure any transmission of data cannot be intercepted and read. To reduce the risk of HIPAA breaches, many laboratories stick to tried and tested delivery methods, and accept there will be a delay in data reaching physicians. Some companies have risen to the challenge, and now ensure faster delivery of lab test results by utilizing new technology. They have leveraged Smartphones to coordinate patient care more efficiently and ensure treatment to patients is provided more rapidly. This smart use of technology has allowed HIPAA-covered entities to improve...

Read More
TigerText Announces First Secure Messaging App for Apple Watch
Apr14

TigerText Announces First Secure Messaging App for Apple Watch

TigerText – the leading provider of secure messaging solutions for the healthcare industry – has today announced details for the first secure messaging app to be made available for the Apple Watch. From early next month, Apple Watch users will be able to take advantage of TigerText´s secure messaging capabilities in order to send and receive secure, encrypted messages from their wrist. TigerText for the Apple Watch will enable users to securely communicate with anyone hands-free, helping them save valuable time – especially in critical care settings. TigerText’s Apple Watch app brings all the benefits of the healthcare industry’s leading secure messaging app to the wrist. As with the TigerText apps for mobile device and desktop computers, users will be able to see when a message has been sent, delivered and read. The TigerText Apple Watch app will also have these key features: • Speech-to-Text: As an alternative to typing out a text message, users will be able to dictate to the app – which will then translate the words into text. • Receive Notifications and...

Read More
HTTPS Filtering Now Integrated into WebTitan
Mar27

HTTPS Filtering Now Integrated into WebTitan

The latest release of WebTitan´s web filtering solution has a number of new features – including advanced HTTPS filtering for sites using SSL inspection. WebTitan 5.00 allows IT administrators to easily monitor, control, and protect online users, and permits the creation of acceptable use policies that further safeguard your healthcare organization. The web filtering solution has been re-engineered to provide improved functionality, speed, and scalability; and – with the SSL inspection feature – now enables the blocking of individual pages on HTTPS websites that breach acceptable use policies. As more and more websites default to HTTPS and become SSL-enabled, the need to be able to analyze encrypted SSL traffic has become critical. With the SSL inspection feature enabled in WebTitan 5.0, in addition to filtering HTTPS URLs, the content is decrypted, examined, and – if acceptable – re-encrypted and forwarded to the client. This enables administrators to decrypt SSL traffic for specific domains and scan it for policy compliance and the presence of...

Read More
How Providence Anesthesiology Leveraged Smartphones to Improve Communication with Field Staff
Nov18

How Providence Anesthesiology Leveraged Smartphones to Improve Communication with Field Staff

Healthcare providers have a challenge ahead of them if they are to improve communication with field staff and other mobile workers; how to do so without exposing patient data and violating HIPAA Rules. Providence Anesthesiology Associates opted to use a secure messaging platform to help stay in touch with critical members of the care team, and is now reaping the rewards. Communicating with mobile workers and field staff is convenient, fast and easy via Smartphones; whether they are owned by an employee under a BYOD scheme, or provided by employers. However, ensuring communications remain HIPAA-compliant is difficult. PHI cannot be transmitted via insecure channels, meaning standard communication methods available through mobile devices cannot be used. If PHI is to be transmitted via an insecure channel, HIPAA requires the data to first be encrypted. To ensure remote workers do not inadvertently violate HIPAA Rules by using insecure channels to communicate PHI, HIPAA –covered entities should consider using a HIPAA-compliant text message platform that will allow the transmission of...

Read More
Leading Texas Hospice Embraces Secure Messaging
Oct08

Leading Texas Hospice Embraces Secure Messaging

The Solaris Hospice is one of the largest palliative care providers in the Southwest – operating from sixteen locations to provide care and support for more than four hundred patients each day. The hospice´s 150 physicians and nurses work in a vast rural area in which effective communication is a must in order to maintain the organization´s reputation as a healthcare leader among the communities it serves. One of the biggest issues experienced by the organization was maintaining the integrity of its client´s protected healthcare information (PHI) while its workforce was distributed throughout the community. Following the enactment of new regulations within the Health Insurance Portability and Accountability Act (HIPAA), all PHI now has to be encrypted and monitored when it is at rest or in transit. The new regulations mean that “traditional” methods of communicating patient data – such as SMS and email – are effectively outlawed, and this created an issue for community nurses who wanted to escalate patient concerns to the organization´s medical team or send images...

Read More
TigerText Announces Free Healthcare Communications Webinar Entitled “Ask the Experts”
May14

TigerText Announces Free Healthcare Communications Webinar Entitled “Ask the Experts”

TigerText has announced it will be hosting a free healthcare communications webinar in which former HHS regulator Adam Greene will be discussing best practices for implementing a HIPAA-compliant mobile communications strategy. “Ask the Experts: Tips for a HIPAA Compliant Mobile Strategy” has been designed to address the security and mobility challenges faced by healthcare organizations striving to comply with the requirements of the HIPAA Security and Privacy Rules. During the discussion, former Health and Human Services regulator and attorney focused on health information privacy and security – Adam Greene – will advise attendees of tips and best practices to adopt in order to equip their medical facilities with a HIPAA compliant mobile strategy. The event will provide an opportunity for participants to learn from Greene’s in-depth expertise on healthcare rules and regulations. Greene will explain how to evaluate security risks, how to protect PHI from data breaches and unauthorized access, and provide insight on how to develop a secure and effective enterprise...

Read More
TigerText Offers Healthcare Organizations a $1 Million Guarantee against HIPAA Violations
Mar31

TigerText Offers Healthcare Organizations a $1 Million Guarantee against HIPAA Violations

TigerText has announced the company will indemnify healthcare organizations using its secure messaging app against fines imposed for violations of the technical safeguards in the HIPAA Security Rule. TigerText is one of the leading providers of secure messaging solutions for the healthcare industry. Using the TigerText secure messaging app, healthcare providers are able to quickly communicate Protected Health Information (PHI) from any desktop computer or mobile device without violating HIPAA regulations. TigerText enables healthcare organizations to embrace secure messaging as an alternative to unsecure channels of communication such as SMS and email; and the company is so confident in the compliance levels of its secure messaging app that it is offering a guarantee of up to $1 million against fines imposed for violations of the technical safeguards in the HIPAA Security Rule. Speaking about the TigerText compliance guarantee, the company´s co-founder and SEO – Brad Brooks – said: “At TigerText our number one priority is to keep patient data safe. It is imperative that...

Read More
Gold and Silver Info Security PG Global Excellence Awards for Fortinet FortiGate Platform
Mar07

Gold and Silver Info Security PG Global Excellence Awards for Fortinet FortiGate Platform

It has been a good day for Fortinet at the Info Security Products Guide Global Excellence Awards, with the company collecting a gold and silver award for its UTM and next generation firewalls. Fortinet was awarded the gold medal for its FortiGate-140D-POE Unified Threat Management appliance in the Integrated Security and Unified Threat Management category, and a Silver award for the FortiGate-240D in the Firewall category. The Info Security PG Awards, now in their 10th year, celebrate the best IT and security vendors and their ground-breaking products and security solutions. The prestigious awards are highly coveted with award winners confirmed as having products that set the bar higher for the competition. A panel of 50 expert judges assesses each product on a wide range of criteria, with the scores aggregated to determine the winner in each category.  The winners of this year’s awards were announced at a glittering ceremony in San Francisco on February 24, 2014, attended by finalists, judges, and industry peers. The FortiGate-240D – and the 200D series – are mid-range network...

Read More
EdgeWave Launches New Cloud-Based Web Security Solution
Jan30

EdgeWave Launches New Cloud-Based Web Security Solution

EdgeWave has announced the launch of its new enterprise-class web security solution – Cloud Endpoint Security. The web security solution has been developed for enterprise users to secure their endpoints by blocking advanced persistent threats, viruses, ransomware, malware and botnets. The solution can also be configured to block categories of web content that is unacceptable for use in the workplace. There are massive benefits to be gained from allowing end users to access the Internet, although Internet access is far from risk free. Organizations that allow Internet access need to manage risk effectively, which means the use of security solutions that can block access to malicious web content. The new cloud-based web security solution allows enterprises to carefully control the types of web content that employees can access, while blocking a wide-range of web based threats. The solution can be used to protect users and their devices while connected to on premise and off premise networks, creating a safe browsing environment with close to zero latency. The solution is idea...

Read More
AV-Comparatives Rates FortiGuard Top Security Product with Full Marks for Anti-Phishing and Malware Removal
Jan27

AV-Comparatives Rates FortiGuard Top Security Product with Full Marks for Anti-Phishing and Malware Removal

AV-Comparatives has given Fortinet’s FortiGuard full marks in its recent December Summary Report 2013. The Fortinet Advanced Threat Protection (APT) technology was given top marks (3 stars) for anti-phishing, proactive catch rate, file detection, malware removal, and its real-world test. For the report, AV-Comparatives assessed FortiGuard along with 21 other antivirus products for their ability to block malicious software without preventing legitimate content from being accessed. The assessments took place over the course of the year. AV-Comparatives publishes the findings of its research in its annual report and highlights the products that have performed the best and achieved the highest scores across all of the test areas. The reports help businesses choose the most effective anti-virus products. All of the 21 products under test achieved reasonable and acceptable scores in all test areas, although some products provided outstanding protection. Those products were recognized and give awards. AV-Comparatives CEO and Founder Andreas Clementi explained that not all of the products...

Read More
Fortinet Launches FG 280D POE Targeting Smaller Business Networks
Jan13

Fortinet Launches FG 280D POE Targeting Smaller Business Networks

Fortinet has launched a new network security appliance for SMBs and smaller network operations – the FortiGate FG 280D POE. The appliance delivers security for wired and wireless networks, providing comprehensive threat protection through the firewall, VPN, antispam, web filtering, intrusion prevention, data loss prevention, dynamic routing for IPv4 and IPv6, application control, endpoint NAC, and SSL-encrypted traffic inspection. The 84-port device is well suited to organizations with relatively small networks such as small healthcare facilities and retail outlets. Even though considerably smaller than many of its other appliances, it is still a powerful high port density device with firewall throughput of 4GBps, 10 Gigabit Ethernet SFP+, and the capability to handle 3.2 million concurrent sessions. The appliance can help organizations cut out some of the complexity of current systems and eliminate costs. Multiple devices can be connected and managed through PoE ports on the FortiGate appliance, as Fortinet VP of product marketing explained, “By integrating the flexibility of...

Read More
Next Gen Secure Enterprise Messaging App Great News for HIPAA Covered Entities
Apr23

Next Gen Secure Enterprise Messaging App Great News for HIPAA Covered Entities

A next generation secure enterprise messaging app has recently been released, offering HIPAA-covered entities a fast, convenient and secure method of communicating. The real time messaging app has all of the required security features to ensure HIPAA-compliant text messages can be sent quickly, easily, and 100% securely. Communication Problems in the Healthcare Industry   Hackers, malicious insiders, and thieves are trying to obtain healthcare data from HIPAA-Covered entities (CEs); and many are succeeding. The use of Smartphones and other mobile devices has caused concern, as the units are difficult to effectively secure. HIPAA places a number of demands on healthcare providers and other CEs to ensure Protected Health Information (PHI) is kept secure and confidential. There are mandatory data security requirements detailed in the HIPAA Security Rule, and many addressable areas, which ensure that healthcare providers achieve an acceptable standard of data security. Under HIPAA Rules, PHI cannot be sent via insecure networks unless it has been encrypted or deidentified. SMS, and the...

Read More