Using SIEM Technology to Streamline HIPAA Compliance

There are 154 separate risks underlying the HIPAA compliance security standard. Addressing and continually monitoring each of these risks individually can be an enormous task for a security officer. SIEM technology allows most of these risks to be identified, addressed and monitored for complete HIPAA compliance. SIEM Technology and HIPAA Compliance SIEM technology allows for […]
Black Friday Threats

Targeted threats against shoppers and retailers alike are on the rise, especially with Black Friday coming up. As the volume of shopping increases for the 2016 holiday shopping season, shoppers need to arm themselves with knowledge regarding account takeovers targeting their bank information using Phishing, Smishing, Spam and Malvertising methods. Retailers also need to be […]
Correlation, Detection, and Alerting in Real-Time for Active Directory
Imagine how much damage a hacker could do by compromising your Active Directory. Active Directory, which is used by an estimated 95% of Fortune 5000 companies, forms the core services for security and permissions management. It allows IT administrators to configure permissions through one console to ensure their users and computers align with their company’s […]
Tips for Email Security

May 5th, 2016 is World Password Day – a day created to encourage safe password practices. The best defense against external threats is staying informed and diligent with your security practices, especially when it comes to email security. Here are some tips to help stay safe from email threats: Never share your password. If someone […]
Annual Cybersecurity Survey Reveals Challenges for 2016

2015 was a tough year for data breaches. Companies of all sizes and industries fell victim to hackers, costing billions of dollars and harming the reputations of many organizations. So what is in store for 2016? Will cybercriminals continue to find new ways to get onto networks or will enterprises be prepared to prevent damaging […]
Increased Risk of Foreign Cyber Attacks

In April, we alerted customers that hackers are planning to use zero day exploits to take over unpatched Windows XP machines and use them as botnets in coordinated DDOS attacks. This cyber attack alert discusses a new threat that is also related to Windows XP vulnerabilities. According to our sources, government agencies believe the current […]
Data Privacy Day 2016

Today, January 28th, is Data Privacy Day. Data Privacy Day (DPD) is part of the #PrivacyAware campaign, which reminds businesses of the importance of data security within their organization. As a DPD Champion, we’re working towards the common goal of improving consumer and business consciousness while also encouraging and empowering people to be more aware […]
Five Use Cases of Behavioral Analytics to Protect Customer Networks

Interest in user and entity behavioral analytics, or UEBA as recently coined by Gartner, has risen dramatically over the past 12 months. And it’s for valid reasons. Attackers are using more and more sophisticated approaches to bypass traditional defense mechanisms. Companies are constantly looking for enhanced solutions to protect their users and valuable assets, but […]
The Importance of Controls for MSSPs

Should Your MSSP be SOC 2 Compliant? SOC stands for Service Organization Controls and falls under the Statement on Standards for Attestation Engagements (SSAE) No. 16. SSAE 16 was issued by the Auditing Standards Board of the American Institute of Certified Public Accountants (AICPA) in 2010. SSAE 16 effectively replaces SAS 70 as the authoritative […]
Medical devices growing concern in healthcare IT security

Practically every hospital and healthcare institution invariably depend upon medical devices. These devices produce a sizable amount of data and despite the fact that very little of this data is retained for any longitudinal patient benefit, the data must be safeguarded per federal requirements. Proficio’s security engineers have worked with a number of healthcare IT […]
Cybersecurity Awareness Month: A 3-Step Plan to Being Cyber Secure

Cybersecurity Awareness Month: A 3-Step Plan to Being Cyber Secure Step 1: Train your employees to be security savvy Some of the most basic, “expected” tools in security are often those most overlooked. Your first step to defense from cyber criminals is your employees. Having a security training program in place and creating policies to […]
The Scary Truth About CyberSecurity

With just two months left in 2015, it is shocking to find that this year may be one of the scariest years as far as data breaches go. Recent reports show data breaches to be increasingly common. And as these threats become bigger and more harmful, the future looks spooky. The overall costs for cyber […]