The Hostway Blog

Peter Marsh

Director of Security

Recent Posts

The 6 Stages of a Malicious Cyber Attack

You don't have to look very far to find an example of a malicious cyberattack. For example, the June 2017 hack of password manager OneLogin. Intruders accessed a set of Amazon Web Services (AWS)...

Read More

Hackers and Healthcare Data: Love at First Breach

2016 was a record-breaking year for the healthcare industry, and not in a positive way. Last year saw the most healthcare data breaches in history, and this trend hasn't slowed in 2017.HIPAA...

Read More

Hacker Recon: How Data Thieves Do Their Homework

What does a hacker want to know about your system? What OS you’re running? Your IP address? Your CRM vendor? Malicious breaches are happening at an ever-increasing rate, and it’s tough to know...

Read More

Hackers Gonna Hack: Limit Your Personal Risk

You’ve got too much going on just trying to keep your business or organization profitable to worry about every new security exploit that compromises not only your assets, but inherently, your...
Read More

Risking It All: How to Accidentally Destroy Your Production Database, Reputation, and Company

Do you remember your first day of work? Your very first day of full-time, non-intern, benefit-getting, 401(k)-matching, big kid work? For user "cscareerthrowaway567", the first day of...

Read More

Top 3 Healthcare Breaches: Could They Have Been Prevented?

Last year, the healthcare sector experienced a record-breaking number of data breaches, underscoring the importance of staunch security. Over the course of 2016, the industry saw 40 percent more...
Read More

'WannaCry' Attacks – Time to Assume the Phalanx Formation?

As you've likely heard by now, the world received a giant wake-up call on Friday, May 12th in the form of a ransomware cyber attack that used vulnerabilities in the Microsoft Windows OS (yes, the...
Read More

Encrypt or Be Hacked: Healthcare Information Security

It’s a fact. Hackers want healthcare information. They want it even more than they want credit card information. Due to the value of electronic protected health information (ePHI), healthcare has...

Read More

Unchecked IoT Security and How to Protect Your Business

The internet of things (IoT) is hotter than ever and a constant topic in technology circles, meaning recent cybersecurity problems and their effect on critical internet services have thrown IoT...

Read More

Newly Discovered PowerShell DNS Trojan Attacks Through a Super-Common Program

Recently, the Cisco Talos security threat research team turned up a significant new threat launched via Microsoft Word. The attack infects systems with malware by quietly using the domain name...
Read More