Tag: computer
-
Cyber Security: Five Common Phish Attack Schemes
Hackers only need you, that’s right just you. They are sneaky and know the general population is busy and doesn’t pay close attention to the emails they receive. Hackers know people are comfortable in their daily habits. They exploit this behavior by creating email scenarios designed to encourage a click. They need just one person…
-
Don’t Fall Victim to Cyber-Security Disasters
Editor’s Note: This article was originally published in the 2015 Fall Issue of Alabama Medicine magazine Every day, it seems the news is filled with more and more reports of cyber-security attacks. Unfortunately, the health care community is considered a prime target for those individuals who would seek to gain access to confidential information. Did…