Card image cap

October 27, 2020 | Ryan Ferguson

Healthcare: Don’t Become A Statistic

Healthcare organizations have not been immune to the plague of ransomware. In 2019 alone, scores of hospitals and health systems were infected with ransomware, with a combined estimated cost of $4 billion. While already an alarming number, this only accounts for the monetary losses predicted in the wake of these outbreaks, not the damage to reputation, stress on the workforce, and the residual effects of breaking through a ransomware event.

Continue Reading

Card image cap

October 20, 2020 | Nathan Maederer

DoD Releases New CMMC Score Requirements

New CMMC Interim Rule goes into effect on November 30th and new regulations require all contractors to publish their score representing their NIST 800-171 compliance progress before they can receive a contract.

Continue Reading

Card image cap

October 19, 2020 | Ross Fillipek

Telehealth and Mobile Device Management: How to Protect ePHI

Telehealth and remote healthcare work have rapidly increased due to the COVID-19 pandemic. While healthcare organizations quickly adapted to ensure continued patient care, many also deployed remote systems that had security flaws, leaving them more vulnerable to cyber-attacks. Amidst this massive acceleration of telehealth, some providers report a nearly 50% increase in patients opting to be seen virtually rather than in person.

Continue Reading

Card image cap

October 12, 2020 | Ross Fillipek

How To Protect PHI While Working Remotely

Ransomware attacks on Heathcare providers have been on the rise in 2020 with the increased numbers of remote workers. Many organizations rushed to deploy systems to ensure patients were being taken care of, but with the rush many security protocols were overlooked leaving them more susceptible to cyber criminals.

Continue Reading

Card image cap

October 8, 2020 | Lizzie Danielson

Coffee Machine Demands Ransomware

As if 2020 couldn’t get any stranger, an internet-connected coffee machine has been hacked by ransomware. That’s right, a coffee maker in an office was infected with ransomware.

Continue Reading

Card image cap

September 30, 2020 | Jerome Smith

Another Healthcare Organization Hit By Ransomware

Universal Health Services is a Fortune 500 hospital and healthcare services provider, has reportedly shut down all systems at healthcare facilities across the US after a cyber-attack hit its network early Sunday morning. UHS provides healthcare services to approximately 3.5 million patients each year.  

Continue Reading

Card image cap

September 23, 2020 | Lizzie Danielson

How Security Awareness Training Can Help your Business Comply With the SHIELD Act.

Cybersecurity is a necessity for any business today. Organizations that handle private data such as financial or medical information have long been required to safeguard it. But now New York’s SHIELD Act is tightening the regulations for that security.

Continue Reading

Card image cap

September 9, 2020 | Lizzie Danielson

Take a Tour of Our Augusta Based Security Operation Center

At Corsica Technology we have two geographically located Security Operation Centers. Charles Johnson our President of Cyber Security gives a tour of our Augusta based SOC.

Continue Reading

Card image cap

August 6, 2020 | Ross Fillipek

Protecting Your Customers’ Sensitive Information

Companies operating in the digital landscape have suffered major attacks since the internet’s inception. In 2018 alone, malicious hackers breached billions of records belonging to social media and government organizations, and millions more across the retail, technology, and other industries accessing customers' sensitive information. 

Continue Reading

Card image cap

July 30, 2020 | Ross Fillipek

MFA: The Super-Tool that can Stop 99% of Password Attacks

Multi-Factor Authentication is a security measure that requires multiple types of credentials to verify a user’s identity to access an account. So when a user logs into an account with a username and password, one or more other factors will also be required before allowing access.

Continue Reading