TSMaryna

About Maryna Ozhohanych

This author has not yet filled in any details.
So far Maryna Ozhohanych has created 7 blog entries.

The 5 Key Functions of the NIST Cybersecurity Framework

Digital information and assets represent a growing segment across all industries. This growth has led to streamlined operations, greater productivity, and better oversight for managers and organizational leaders.  These QoL improvements, however, have come at a cost. The increased efficiency of modern computing has led to countless vulnerabilities that malicious actors can use to take control of private information. Cybercrime is ...

2022-07-26T16:55:32-04:00July 26th, 2022|

Dark Web Risks

For the uninitiated, it’s terrifying to learn that the majority of the internet ordinary people use every day makes up only a minuscule percentage of the overall internet.  Websites you see and use contain only 0.3% of the information stored on the internet. The number of existing sites makes it hard to imagine that there can be more out there, but ...

2022-06-17T12:39:33-04:00June 17th, 2022|

Email Phishing Prevention

Hackers never stop their search for new and more sophisticated ways to breach enterprise security measures. Big data presents a target that tempts criminals, who know they can make a lucrative profit off stolen employee credentials and customer information.  Security measures improve more every year to combat cybercriminals, whose technology grows more advanced all of the time.  But no matter how ...

2022-06-06T15:23:10-04:00June 6th, 2022|

Preventing Hospital Ransomware Attacks: A Comprehensive Guide

Ransomware attacks present a huge risk to healthcare providers. When malicious actors can gain control of private information and data, it can be leaked, stolen, or held hostage. This vulnerability means that hospitals that rely on the network infrastructure to provide patient care are often prime targets for cybercriminals. When critical infrastructure comes under attack from cybersecurity threats, hospitals are at ...

2022-05-10T11:26:12-04:00May 10th, 2022|

Cloud Cybersecurity: 5 Tips for 2022 and Beyond

For many enterprise organizations, connecting users and their devices with important information and services means relying on internal IT networks and infrastructure. This reliance can be costly and lead to downtimes when things go wrong. Businesses turn to the cloud for better support and infrastructure, but they still require protection from potential threats and malicious actors who want to gain access ...

2022-05-03T15:40:45-04:00May 3rd, 2022|

Enterprise Cybersecurity: Best Practices for 2022

Businesses that operate online have access to more customers, can reach a larger workforce and are less restricted in how they deliver their service.  However, for many enterprise organizations, important digital information and resources present a huge vulnerability that can potentially leave them unable to deliver their core services to customers. The dangers posed by online activity, user error, and equipment ...

2022-04-28T14:46:23-04:00April 28th, 2022|

Firewall Management: A Quick Guide

Businesses that use the internet for vital operations, communications, and outreach activities are constantly at risk of attacks against their internal systems. Cybercriminals and other malicious actors take advantage of poor or weak network security to gain access to restricted networks and cause disruptions to operations. IT directors and cybersecurity professionals working in mid to large-sized enterprise settings use firewall management ...

2022-04-11T16:38:04-04:00April 11th, 2022|
Go to Top