Blog

Healthcare Ransomware Attacks Require Preventive Care

On September 20th, a ransomware attack forced a county health center in Wyoming to cancel surgeries, inpatient admissions, lab procedures, respiratory therapy, radiology exams and other services. Campbell County Health officials also reported that appointment schedules and medication orders were disrupted due to limited access to patient records and contact information. Although many services have been restored, the organization is still working to clean up its computer systems from that ransomware attack.

3 Ways Telemedicine Makes Healthcare More Effective and Efficient

Quality patient care is the goal of every healthcare provider, but the reality is that many spend up to 60 percent of their time doing administrative tasks rather than delivering care. Doctors, nurses and administrators are all experiencing a time crunch due to steadily increasing management requirements.

Escalating Cyberattacks Make HIPAA Compliance Critical in 2019

On Jan. 29, 2015, health benefits provider Anthem, Inc. discovered that its IT systems had been hit with an advanced persistent threat (APT) designed to exfiltrate data. The cyber attack exposed the electronic protected health information (ePHI) of almost 79 million people, making it the largest healthcare data breach in history.

Why the Oil and Gas Sector Needs Layered Cybersecurity

In previous posts we’ve been talking about cybersecurity in the marine industry. Malware could disrupt or disable the onboard systems in increasingly high-tech vessels. Far more likely are attacks targeting end-user devices that could result in costly IT system downtime or a data breach. In light of these risks, operators of maritime and inland marine vessels should implement a layered security approach that incorporates network and end-user security.

Why End-User Security Is Essential to Maritime Operations

In a previous post on maritime cyber security, we reported on an official “Marine Safety Alert” issued by the U.S. Coast Guard in response to a cyber security incident involving a commercial vessel. The vessel’s onboard computer systems were infected with malware that “significantly degraded” their functionality. We discussed the maritime cyber security best practices recommended by the Coast Guard and the robust security tools GDS integrates into its marine connectivity solutions.

Why Highly Reliable, Secure Connectivity Is Critical in Oil and Gas

The oil and gas industry faces numerous challenges, including fluctuating prices, competition from alternative resources, geopolitical instability, and environmental and safety regulations. Companies in the energy sector must be as agile and efficient as possible to respond to changing demands, maximize market share and gain competitive advantages.

IMX 2019 Highlights Cybersecurity Challenges and Solutions

Professionals from all levels of the commercial marine transportation industry, from CEOs to deckhands, gathered in St. Louis last month for the Inland Marine Expo (IMX). IMX is the annual trade show for highlighting the latest equipment, services, trends and issues that are relevant to the transportation of goods along U.S. inland and intracoastal waterways. We at GDS were excited to be a part of IMX 2019.

Coast Guard Issues Safety Alert Warning Vessels of Cyber Risks

On July 8, the U.S. Coast Guard issued an official “Marine Safety Alert” warning operators of commercial vessels of cybersecurity risks. The alert came in response to a February 2019 incident involving a vessel bound for the Port of New York and New Jersey.

Multiple Cellular Carriers + SD-WAN = Seamless Connectivity for Mobile Workers

Workers in the oil and gas industry often travel long distances to inspect and maintain pipelines and equipment. Tugboat and towboat operators are constantly moving up and down inland waterways. Construction management firms must send workers from job site to job site to oversee projects.

Why IT Projects Fail and How to Avoid the Headache

In a 2017 report from the Project Management Institute (PMI), 14 percent of all IT projects fail. However, this metric only tells part of the story. Of the projects that didn’t fail outright, 49% were late, 43% exceeded their initial budget, and 31% didn’t meet their goals.

How SD-WAN Simplifies and Optimizes Branch Office IT

The success of many organizations is largely dependent on the success of their branch locations. Satellite offices, retail stores, manufacturing facilities, distribution centers, and even vessels on inland waterways need IT resources to keep up with today’s business demands.

sd-wan-hyperconnectivity

Why Highly Reliable WAN Connectivity Is a Must-Have Across Industries

Not that long ago, the wide-area network (WAN) was used to connect a few branch locations to headquarters and headquarters to the public Internet. Today, the WAN has become the foundation of operations in a wide range of industries.

What Are the Biggest Cyber Security Threats in 2019?

The cyber-threat landscape is always changing and evolving. Hackers are notoriously dynamic, constantly improving their tactics and tools to bypass the latest security countermeasures. Organizations that want to minimize their exposure to cyber threats need to be be well-informed and up to date.

Towing Vessel Operators Need Reliable Connectivity for Subchapter M Compliance

As of July 20, 2018, tugboat and towboat operators must comply with new Coast Guard regulations designed to improve safety. Published in the Code of Federal Regulations at 46 CFR Subchapter M, the rules require that towing vessel operators submit to an annual Coast Guard inspection or implement an approved towing safety management system (TSMS). Many operators are deploying onboard vessel management systems to help meet these requirements, but are struggling to maintain the real-time data communications needed to make the management systems work properly and ensure compliance.

Email Security Threats Are More Prevalent and Dangerous than Ever

There’s a reason why more than 90 percent of targeted security threats originate in email. Human beings are the weakest link in the security chain. If an email gateway is like a brick wall that surrounds the network and only lets in a small percentage of threats, a human being is often like a turnstile that only requires a gentle push to gain entry.

Incident Response Plays a Key Role in Effective Cybersecurity

Experts say that a security breach is virtually inevitable — that it’s a matter of “when” not “if.” However, rapid detection and response to a security incident can greatly reduce its impact, as GDS proved recently when it stopped a ransomware attack.

Your IT Company Can’t Protect You If It Can’t Protect Itself

Earlier this year, an attack was carried out against IT service providers. This attack was so damaging that the Department of Homeland Security and FBI Cyber Unit issued high priority alerts. It was the kind of attack that IT providers dread...and it quickly revealed who among them was prepared and who was not.

5 Reasons to Upgrade to a Next-Generation Firewall

Given that time and budgets are always limited, organizations are often reluctant to upgrade IT infrastructure that seems to be working just fine. If it ain’t broke, don’t fix it. But the fact that something appears to be working isn’t enough in today’s cyber threat climate.

How Do You Know If You Need Managed Security Services?

According to the Center for Strategic and International Studies, cybercrime costs the U.S. economy about $100 billion each year. As soon as you think you have one threat properly defended, a new, more dangerous threat emerges. This is why organizations continue to make major investments in IT security, to prevent data breaches and minimize their impact and to satisfy increasingly complex regulatory compliance requirements.

5 Keys to Selecting the Right Managed Services Provider for Your Company

Many in-house IT teams are struggling to keep up with day-to-day administration and management tasks. The IT environment has become increasingly complex, encompassing a broad range of on-premises and cloud-based platforms. Growing numbers of users are accessing these systems with an array of mobile devices. An ever-increasing volume of data must be stored, protected and backed up. Organizations are under constant attack by a never-ending barrage of security threats.

A Data Breach Is Inevitable - How Will You Respond?

There is no organization on the face of the earth, regardless of how sophisticated its security defenses may be, that is immune to a data breach

Why Strategic IT Planning Should be on Your Agenda

IT systems should create value for your organization, drive operational efficiencies and support growth. Given the constantly evolving nature of technology, those objectives are always going to be moving targets. That’s why organizations should regularly engage in strategic IT planning to identify how technology assets are currently performing and where future investments will produce the most benefit.

The Role of LTE Wireless and Satellite Services in Software-Defined WAN

Changing traffic patterns and bandwidth requirements are forcing organizations to rethink their WAN architectures and data transport options. In the past, most applications and resources were hosted in the corporate data center, and branch locations connected to headquarters in a hub-and-spoke architecture. Today, the WAN primarily supports Internet traffic and cloud access, making traditional designs costly and inefficient.

The 3 Cyberattack Vectors No Company Should Ignore

There’s no way to guard against every cybersecurity threat. Some of the largest enterprises in the world, with skilled IT teams and large budgets, have fallen victim to massive security breaches. There are simply too many devices and applications to protect, with new threats emerging every single day.

The Security Capabilities of Software-Defined WAN

In our last post [Software-Defined WAN: Cheaper, Faster, More Secure], we discussed how software-defined WAN (SD-WAN) solutions enable you to reduce WAN cost and complexity while increasing performance, reliability and security. The software-defined component of SD-WAN lies in a smart centralized controller capable of differentiating and segmenting traffic and making routing decisions on the fly. 

Fully Managed Solutions Overcome the Challenges of SD-WAN Adoption

The IT industry is often guilty of hype and oversimplification. New technologies are marketed in a way that creates overinflated expectations, while the potential challenges associated with implementing and managing the technology are minimized. Software-defined WAN (SD-WAN) technology has, for the most part, lived up to the hype.

Get In Touch

310 Laser Lane
Lafayette, Louisiana 70507
Contact Us >

24 / 7 / 365 Support

Our dedicated support
staff are available by
phone 24 hours a day.

Phone: 888-435-7986

Time to simplify your IT?