Securing IoMT devices to protect the future of Healthcare from rising attacks

August 12, 2021 | Theodoros Karasavvas
Theodoros Karasavvas

Theodoros Karasavvas

Theodoros ‘Theo’ Karasavvas is a freelance writer based out of Corinth, Greece. He has written for Ars Technica, American Express, Gizmodo, Gold Visa Japan, Mental Floss, and Ancient Origins, among others. He has a Master of Studies in Law from the University of Athens and speaks four languages. He specializes in writing about history, current events, tech trends, and privacy technology.

August 12, 2021 | Theodoros Karasavvas

Securing IoMT devices to protect the future of Healthcare from rising attacks

This blog was written by an independent guest blogger. Photo by HH E on Unsplash The number of cybersecurity incidents reported within the healthcare industry has been steadily increasing since 2015 as the use of IoMT has become more widespread. With increasing numbers of IoMT devices being used for patient care, the attack surface among hospitals and doctors…

July 6, 2021 | Theodoros Karasavvas

How to protect your site against lethal unauthorized code injections

This blog was written by an independent guest blogger. Lethal unauthorized code injections like XXS (cross site scripting) attacks are some of the most dynamic cyber-attacks. They are often very difficult to detect and can result in credit card theft, fraud, and endpoint data breaches, having a huge impact on small to medium sized businesses.  In a recent AT…

June 21, 2021 | Theodoros Karasavvas

How data poisoning is used to trick fraud detection algorithms on ecommerce sites

This blog was written by an independent guest blogger. Artificial intelligence (AI) and machine learning (ML) systems have become the norm for using client data to provide recommendations to customers. As more people are working from home and conducting business online, it is imperative that fraud detection software is used to protect user information. But these protective systems also utilize…

June 9, 2021 | Theodoros Karasavvas

Are fraudsters using automation to execute mass cyber-attacks?

This blog was written by an independent guest blogger. As our digital world turns toward advances in automated technology to increase efficiency and productivity, cybercriminals are also learning how to execute mass automated cyber-attacks.  According to the 2021 AT&T Cybersecurity Insights Report, most people are concerned about the security of various applications and 52% believe that these threats challenge…

May 5, 2021 | Theodoros Karasavvas

5 IT security strategies that you should think about as employees return to the office

This blog was written by an independent guest blogger. Without a doubt, digital transformation accelerated amid the pandemic and made it possible for employees to work remotely. However, it also intensified the threat landscape created by malicious attackers who jumped on the first opportunity to attack the more vulnerable home networks. As remote working becomes the new norm, it is…

March 29, 2021 | Theodoros Karasavvas

Adaptive cybersecurity: 3 strategies that are needed in an evolving security landscape

This blog was written by an independent guest blogger. Cybersecurity is no longer an outlandish concept to many business enterprise executives. What is still relatively unfamiliar to many organizations and their leadership, however, is the task of evaluating their cyber strategy and risk to determine how best to adapt and grow to stay secure while remaining competitive.  Executives must…

February 15, 2021 | Theodoros Karasavvas

CISOs report that ransomware is now the biggest cybersecurity concern in 2021

This blog was written by an independent guest blogger. As the number of remote working arrangements rose substantially in the last year, cybercriminals were quick to take advantage of these new opportunities. Spam and phishing emails increased in number even more rapidly than telecommuting, and company cybersecurity officers found themselves struggling to keep up.  Phishing emails often came with…

January 28, 2021 | Theodoros Karasavvas

Serverless computing: Is it worth the risk?

This blog was written by an independent guest blogger. A new trend for developers is emerging, as many companies shift towards using serverless computing. The name is a bit misleading, as serverless computing still relies on servers for storing data, but those who use serverless computing leave the maintenance of the server to their provider. They pay only for the…

December 15, 2020 | Theodoros Karasavvas

Why application-layer encryption is essential for securing confidential data

This blog was written by an independent guest blogger. Your business is growing at a steady rate, and you have big plans for the future. Then, your organization gets hit by a cyberattack, causing a massive data breach.  Suddenly, your company’s focus is shifted to sending out letters to angry customers informing them of the incident -…

December 1, 2020 | Theodoros Karasavvas

What is Vizom malware? Everything you need to know

This blog was written by an independent guest blogger. Security researchers working with IBM Security recently uncovered a new malware code that is being used to attack online banking users in Brazil.  Referred to as ‘Vizom’ by the team, the code utilizes remote overlay attacks to siphon sensitive financial data and make fraudulent transactions from victims bank…