Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
29
1
2
3
4
6
7
8
9
10
11
13
14
15
16
17
7:30 AM - HLTH 2025
18
19
20
22
23
24
25
26
27
28
29
30
31
1
2
12:00 AM - NextGen UGM 2025
TigerConnect + eVideon Unite Healthcare Communications
2025-09-30    
10:00 am
TigerConnect’s acquisition of eVideon represents a significant step forward in our mission to unify healthcare communications. By combining smart room technology with advanced clinical collaboration [...]
Pathology Visions 2025
2025-10-05 - 2025-10-07    
8:00 am - 5:00 pm
Elevate Patient Care: Discover the Power of DP & AI Pathology Visions unites 800+ digital pathology experts and peers tackling today's challenges and shaping tomorrow's [...]
AHIMA25  Conference
2025-10-12 - 2025-10-14    
9:00 am - 10:00 pm
Register for AHIMA25  Conference Today! HI professionals—Minneapolis is calling! Join us October 12-14 for AHIMA25 Conference, the must-attend HI event of the year. In a city known for its booming [...]
HLTH 2025
2025-10-17 - 2025-10-22    
7:30 am - 12:00 pm
One of the top healthcare innovation events that brings together healthcare startups, investors, and other healthcare innovators. This is comparable to say an investor and [...]
Federal EHR Annual Summit
2025-10-21 - 2025-10-23    
9:00 am - 10:00 pm
The Federal Electronic Health Record Modernization (FEHRM) office brings together clinical staff from the Department of Defense, Department of Veterans Affairs, Department of Homeland Security’s [...]
NextGen UGM 2025
2025-11-02 - 2025-11-05    
12:00 am
NextGen UGM 2025 is set to take place in Nashville, TN, from November 2 to 5 at the Gaylord Opryland Resort & Convention Center. This [...]
Events on 2025-10-05
Events on 2025-10-12
AHIMA25  Conference
12 Oct 25
Minnesota
Events on 2025-10-17
HLTH 2025
17 Oct 25
Nevada
Events on 2025-10-21
Events on 2025-11-02
NextGen UGM 2025
2 Nov 25
TN

Events

Uncategorized

What Data Breaches Are And How To Prevent Them

data breaches

What Data Breaches Are And How To Prevent Them

A data breach is a violation of your security, in which information that’s confidential, important, or both is accessed by someone with no authority to do so. When this happens, identity theft or even financial ruin can be the result. Cyberattacks have surged over the past year and a half, with Techjury reporting a frequency of one attack every 11 seconds in 2021. Thankfully, the tools and techniques used to counter these threats are also evolving. Here are a few simple but effective tactics that individuals and businesses can use to stay safe online.

Understand the Current Threats

The general public is woefully undereducated regarding cyber threats. Most people have no idea what a packet sniffer or rootkit is, but they’re worth researching because they’re two common vectors for an attack. There’s also a persistent lack of awareness regarding the tactics used by malicious hackers, such as the remote use of vulnerability scanning devices to check for open access ports, or their engagement in lateral movement within a system which allows them to become a long-term threat. The solution is as simple as picking up a security magazine or typing the phrase “security hacker” into Wikipedia. A little knowledge goes a long way.

Inform Your Staff

If you own a company, awareness starts at the top, but it can’t end there. Verizon’s recent Data Breach Investigations Report discovered that around 85% of breaches could be traced to human errors, including workers being conned into giving up sensitive information. A common attack, called phishing, specifically relies on someone either entering information into a fraudulent site or opening a fake email loaded with links to malware. Don’t just teach about the threats; train staff in proper phone and digital professionalism. Make sure everyone knows what not to talk about with strangers and what an untrustworthy URL looks like. The chain is only as strong as its weakest link.

Keep Your Hardware and Software Updated

Using obsolete computers and operating systems is a major threat to online security. You might think that using an old computer means that it won’t be vulnerable to the most modern threats, but the opposite is true. Sometimes that old hardware can’t support the software fixes needed to protect the system. It’s also important to install those software updates as soon as they become available. Even so, 66% of non-expert users only install updates “soon,” “eventually,” or “never.” The prompts may be annoying and some might result in issues for your system, but in general, these updates contain security patches for newly discovered threats that are worth installing.

Backup All Data

Data breaches are incredibly costly, both for individuals who have their identities stolen and for companies that let it happen on their watch. The Ponemon Institute reports the average cost as $146 per file compromised. The most effective solution might be a low-tech one. Store all of your vital data offline in a secure location. This could mean getting a personal or company safe and placing your most sensitive information on encrypted discs locked inside. Another good idea is a locked filing cabinet. If you do store data in the cloud, make sure that it’s with a company with a good reputation for security.

Prioritize Endpoint Protection

Endpoint security isn’t a technology, but rather a suite of technologies and the methods used to deploy them effectively. Two decades ago, everyone’s experience online was contained to a single computer. Now, most people own multiple devices. If defensive software (like antivirus programs) and user protocols aren’t standardized across all of them, a breach of any one of them could infect the entire network. Solid endpoint security makes use of high-quality antivirus programs, malware-catching firewalls, virtual private numbers (VPNs) and the limiting of user access to equally secure all devices on a network. With many people still working remotely on diverse machines, this centralized approach could make all the difference.

Upgrade Physical Security Systems

Spending a fortune on the latest firewall is useless if a hacker breaks in and steals your devices. Whether for a home or office, advanced biometric security systems are becoming affordable and can be used to add layers of security to data storage devices and locations. CCTV camera systems trained on vulnerable points of entry can be another good investment. One facet of security often overlooked is the garbage bin. Many people are careless with what they throw away, and cybercriminals use that to their advantage. “Dumpster diving” is a time-honored tactic used by hackers to gather information on targets, so never throw away passwords or important documents without shredding them first.

It’s a digital age, and along with that way of life comes the risk of encountering online threats. Educating yourself on the threats we all face and the solutions available is the only way to keep everyone in cyberspace secure.