“Starting from early July, we have seen malicious spam activity that has targeted corporate mailboxes… The malware’s key objective is to steal passwords from browsers, messaging applications, mail and FTP clients, and cryptocurrency wallets.” Secure List, Loki Bot: On a hunt for corporate passwords   Experts from Kapresky lab have come… Continue Reading Major Security Firms Detect a Surge in Phishing Attacks on Corporate Email Accounts

Of the 229 breaches added this year to the HHS “wall of shame”, the largest one is the attack on UnityPoint Health. The Iowan company fell victim to a business email compromise (BEC) attack that compromised its business email system. How big is the UnityPoint Health data breach? As per… Continue Reading Business Email Compromise – How it Works?

“According to Varonis, 41% of organizations had more than 1,000 sensitive files open to every employee, with data such as “credit card information, health records, or personal information subject to regulations like GDPR, HIPAA and PCI” readily available to anyone with access to the system.” By Jonathan Greig, Tech Republic… Continue Reading Global accessibility – A Mistake Healthcare Providers Cannot Afford

The schools publicly reported inaccurate crime statistics and never told parents and students about programs for combating violence against women, as required, the audit found. –San Francisco Chronicle  The audit report published by the California State Auditors who audited a selection of California’s institutions shares the results of their examination of… Continue Reading Clery Act Requirements- California Colleges Have Failed to Comply, State Auditors Report

What actions or behaviors do you believe could be considered as sexual harassment? Most of us have witnessed behaviors that could be considered sexual harassment in the workplace at one time or another – even if in a subtle form. Think of a situation that made you feel particularly uncomfortable?… Continue Reading Your 3-Minute Guide to Sexual Harassment Prevention

Physical safeguards are set of rules and guidelines that outline how the physical storage and access to protected health information should be managed under HIPAA security rules. This infographic by Vigyanix details the Physical Safeguard requirements for facility access controls, workstation use and security and device and media control.

We can’t realistically expect to make major progress in combating health problems and disparities without a solid grasp of the underlying data about health conditions. Take the pressing issue of asthma. About 15 percent of California children have asthma, according to data from the California Health Interview Survey. That percentage… Continue Reading California Works to Parlay Health Data into Action

It’s no secret that stories make eLearning content more engaging and help learners retain the information they are learning. Stories are so natural to us that we don’t even need to follow the plot to know what’s going on. Narrative theory tells us that stories are how we experience and… Continue Reading Narrative Theory In eLearning: How Stories Help Us Learn

A school district in Alabama has become the first in the state to begin implementing a new technology designated to protect teachers and students during active shooter situations. The technology, called SafeDefend, is “a small box that will be in every room in the Limestone County School System. The device… Continue Reading District Implements Technology System to Help Teachers Protect Classrooms in Active Shooting Situations