HackDig : Dig high-quality web security articles for hackers

Why NHS, UK Healthcare Orgs Need to Boost Their Security in Age of COVID-19

All National Health Service (NHS) and social care organisations in the United Kingdom have always been and will always be a target for bad actors. The nature of their business and the sensitive data they hold make these entities appealing to bad actors who know that legacy systems, and/or, not regularly patched systems, such as those employed by healthcare o
Publish At:2020-06-04 04:29 | Read:133 | Comments:0 | Tags:Healthcare data security legacy systems NHS

The Living Dead: How to Protect Legacy Systems

The recent widespread attacks of WannaCry and NotPetya both used known vulnerabilities of legacy operating systems, namely SMB v1 protocol. In general, known vulnerabilities are easy to mitigate as long as patches and updates are provided. But in these cases, many organizations seem to have ignored the advice to patch their systems — or maybe not. There ar
Publish At:2017-07-20 21:00 | Read:4894 | Comments:0 | Tags:Network Risk Management Legacy Applications legacy systems n

April 911 Outage Affected 3.5 Percent of U.S. Population

In the early hours of April 10, a series of errors led to a massive, multi-state outage in the emergency call management centers (ECMCs) that handle 911 calls in seven geographically dispersed states. The incident originated at an obscure but critical call routing hub in Englewood, Colo., and ended up knocking out the emergency communication infrastructure f
Publish At:2014-10-23 01:15 | Read:3735 | Comments:0 | Tags:Critical Infrastructure Government 9/11 911 call center crit

Building Cyber Security Right From the Start

If you want to make sure visitors to a building are properly checked in at the front door, the best time by far to arrange for this security precaution is at the initial design stage. This is when the front entry can be designed to be secure, practical and inviting, and other entrances can either be eliminated or appropriately secured. Unsurprisingly, the sa
Publish At:2014-08-10 12:03 | Read:5010 | Comments:0 | Tags:CISO Risk Management Chief Information Security Officer (CIS


Share high-quality web security related articles with you:)