Tag: third-party risk

How to Protect Your Organization’s Network from 3rd Party Breach

How to Protect Your Organization’s Network from 3rd Party Breach

Information Security
How to Protect Your Organization’s Network from 3rdParty Breach Computers in nearly 400 dental offices across the U.S. had been infected with ransomware after DDS Safe, a cloud management software that backs up client data for the affected dental offices was compromised by still an unidentified attacker or attackers. This incident shows the need to protect your organization’s network from 3rdparty breach. Last August 26th, theWisconsin Dental Associationthrough its Executive Director Mark Paget announced that nearly 400 dental offices across the U.S., with a small percentage of these dental offices based in Wisconsin, had been unable to access their client data as a result of the compromised at DDS Safe, a service from The Digital Dental Record, a subsidiary of the Wisconsin Dental Association. Days following the ransomware attack, PerCSoft,…
Read More

Tag: third-party risk

How to Protect Your Organization’s Network from 3rd Party Breach

How to Protect Your Organization’s Network from 3rd Party Breach

Information Security
How to Protect Your Organization’s Network from 3rdParty Breach Computers in nearly 400 dental offices across the U.S. had been infected with ransomware after DDS Safe, a cloud management software that backs up client data for the affected dental offices was compromised by still an unidentified attacker or attackers. This incident shows the need to protect your organization’s network from 3rdparty breach. Last August 26th, theWisconsin Dental Associationthrough its Executive Director Mark Paget announced that nearly 400 dental offices across the U.S., with a small percentage of these dental offices based in Wisconsin, had been unable to access their client data as a result of the compromised at DDS Safe, a service from The Digital Dental Record, a subsidiary of the Wisconsin Dental Association. Days following the ransomware attack, PerCSoft,…
Read More