Agile1 is now AgileBlue. This is an exciting change that marks the first step in a series of new developments for our growing business. Why the name change? In an effort to ensure unique name recognition in a crowded cyber security field, our research identified a...
Tony Pietrocola
SolarWinds Breach Update
If you are an Agile1 customer (thank you) we have taken the necessary steps to ensure you are properly being monitored 24/7. While no platform is guaranteed to stop a motivated and well-funded nation-state from a breach, working with the Agile1 SOC-as-a-Service can...
Telehealth and HIPAA Compliant Response
Healthcare organizations are responsible for protecting patients and system operations while also maintaining HIPAA compliance. A breach within a network can be extremely harmful not only for healthcare providers but patients as well. Telehealth has grown in...
Coronavirus Vaccine IP at Risk as Multiple Countries Attempt to Steal Information
The former director of the Cybersecurity and Infrastructure Security Agency (CISA), Chris Krebs, has announced that China, Iran, North Korea, and Russia are all attempting to steal intellectual property (IP) surrounding the vaccine for the coronavirus. This statement...
4 Ways Healthcare Providers Can Defend Against Ransomware
Healthcare Providers have become the number one target of cyber criminals world-wide. Three federal agencies: FBI, CISA and Department of Health and Human Services, even issued a warning of these impending and persistent ransomware attacks being launched against the...
Kubernetes Allows Healthcare Organizations to Scale and Secure Workloads
Managing and securing disparate pieces of container architecture is a difficult undertaking for healthcare organizations. With Kubernetes, healthcare organizations have the opportunity to overcome the challenges presented by HIPAA and automate application deployment,...
If the hospital’s digital assets and patient data are compromised, catastrophic events could take place
Cyber criminals have rapidly worked to take advantage of the new landscape, targeting virtual private networks (VPNs), cloud service platforms, and remote workers in an effort to financially benefit from the pandemic. Visibility, network access management, and...
Cyber and IT Executives Fear Burnout
Cyber chiefs fear burnout. Long hours, remote work, a lurking pathogen and an onslaught of cyberattacks have security chiefs concerned that their staff are quietly absorbing too much stress at once. In a report from McKinsey, they found Cyber leaders most concerned...
2020 Report: Most Common Causes of Malicious Health Data Breaches
According to HIPAA Journal In healthcare, 50% of data breaches were due to malicious attacks, 23% were due to system glitches, and 27% were caused by human error. Malicious attacks were most due to cloud misconfigurations and compromised credentials, with each...
15 CyberSecurity best practice tips from FS-ISAC on cyber-risk in the global financial system
15 CyberSecurity best practice tips from FS-ISAC on cyber-risk in the global financial system, for teleworkers, work from home (WFO). https://bit.ly/2zemsRz