Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Honor Among Hackers? Not for Those Who Hack Hospitals

Honor Among Hackers? Not for Those Who Hack Hospitals

It’s safe to say that hacking is a frowned-upon practice, but that hasn’t stopped cyber criminals from attempting to turn a profit off of it. This practice has led them to target nonconventional organizations, including hospitals and other healthcare facilities. However, just because a hacker can target a hospital, does this mean that they should? This is a topic of some debate amongst hackers, whom, believe it or not, actually do have some sort of ethical standards.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftBusiness ComputingSoftwareHackersGoogleEfficiencyBusiness ManagementInnovationProductivityHosted SolutionsBackupUser TipsWorkplace TipsManaged Service ProviderMalwareBusinessMobile DevicesNetwork SecurityHardwareProductivityIT ServiceswindowsComputerUpgradeCommunicationEmailDataIT SupportMiscellaneousSaving MoneyGadgetsSmartphonesVirtualizationWindows 10SmartphoneAppsDisaster RecoveryBusiness ContinuitySmall BusinessNetworkVoIPServerBrowserMicrosoft OfficeMobile Device ManagementTech TermInformation TechnologyHealthMobile ComputingAndroidSocial MediaQuick TipsPasswordsCybersecurityOperating SystemGoing GreenWindows 10Data BackupOffice 365Mobile OfficeHolidayData RecoverycommunicationsSave MoneyOfficeChromeBYODspamAppAlertBest PracticeOutsourced ITCybercrimeCollaborationApplicationUsersInternet of ThingsEmployer-Employee RelationshipLaw EnforcementManaged IT ServicesMarketingIT SupportSearchData SecurityRansomwareBring Your Own DeviceWirelessThe Internet of ThingsFacebookTabletWearable TechnologyPhishingAppleVendor ManagementRemote ComputingWiFiAutomationRouterWireless TechnologyiPhoneBDRMoneyRisk ManagementCost ManagementUser ErrorHackingRemote MonitoringMaintenanceAntivirusUnified Threat ManagementSaving TimeAvoiding DowntimeHistoryMobilityTech SupportBig DataEncryptionOffice TipsHard DrivesOneNoteGovernmentCloud ComputingPasswordBandwidthData ManagementComputersSocialTelephone SystemsArtificial IntelligenceCustomer Relationship ManagementIT SolutionsPhone SystemInformationOutlookManaged IT ServicesGmailUSBTwo-factor AuthenticationPowerPointAnalyticsUnsupported SoftwareUpdateProactive ITFirewallWi-FiShortcutSocial NetworkingVulnerabilityLithium-ion batteryCurrent EventsGoogle DriveNetworkingVPNHumorWebsiteNet NeutralityEducationBudgetPrinterRecoveryWordIdentity TheftManaged ServiceWork/Life BalanceIT COnsultantStreaming MediaExcelTrendingComputer RepairAuditMobile DevicePoliticsMeetingsTravelIntranetTelephonyLaptopAugmented RealityVirusContent FilteringApplicationsSocial EngineeringadministrationManaged ITBlockchainTelevisionDisasterEntertainmentRetailBatteryPaperless OfficePersonal InformationAutomobileData ProtectionCleaningFax ServerValueGoogle AssistantConferencingSaaSComputingIT ManagementSave TimeComputer CareHaaSDeviceshackerManaging StressStoragePatch ManagementLegalTransportationFraudGoogle DocsEnd of SupportCommerceOnline CurrencyFlexibilityHosted SolutionBusiness IntelligenceBusiness TechnologyYoutubeWireless ChargingCustomer ServiceBiometricsAccess ControlScamFile SharingData StorageMobile SecurityData BreachPrivate CloudVirtual RealityUninterrupted Power SupplySalesProject ManagementHard DrivePoint of SalePrinter ServerCortanaHIPAAHybrid CloudEvernoteInternet ExlporerHuman ResourcesWannaCryProgrammingDDoSTwitterEmailsTouchscreenInstant MessagingSamsungDisplayAmazonSportsBenefitsPrintingOneDriveeWasteComputer AccessoriesWindows 8IT solutionsMicrosoft WordFilesBrandingTelephoneRoot Cause AnalysisLanguageMachine LearningPCCompany CultureEbayMouseSoftware as a ServiceWindows 10sDevice SecurityChromecastWindows InkReputationWIndows 7HyperlinkDowntimeComputer ForensicsSmartwatchGiftsNetwork CongestionAdministratorLifestyleRegulationsSolid State DriveWorker CommuteWIndows Server 2008KeyboardGoogle MapsBluetoothWasting TimeSettingsProactiveE-CommercejunkManagementServer MaintenanceCredit CardsVideo GamesAccessCamerasVendorHard Disk DriveSpyware3D PrintingHiring/FiringData LossSharePointSurge ProtectorUserAccessoryWebsitesPayment CardsfilterWireless InternetInvestmentFAQVirtual DesktopPresentationEmployee-Employer RelationshipSyncSmart TechnologyTeamworkBest AvailablePeripheralData TheftEmployeeGamificationROIChargerScienceNokiaRobotGift GivingEdgeMicrosoft ExcelAdvertisingApp storeBreak/FixMemoryScalabilityCommunityData storageBuisnessTestingMicrobloggingiOSCiminalExperienceAdobeISPPDFRunning CableMedical ITFinancialIntrantetUpgradesHow ToNear Field CommunicationCameraComputer FanAdminMusicEmployer Employee RelationshipBloggingText MessagingTutorialScreen MirroringIdentity5GConsultantTouchpadIT consultingProjectsWebinarIT budgetImagesKeyboard ShortcutsBooksLicensingLegislationCastData PrivacyEmployeesVirtual AssistantWorkersBlack MarketCo-managed ITReliable ComputingWindows 7MonitorsPayrollElectronic Medical RecordsTabletsVoice over Internet ProtocolComparisonDistributed Denial of ServiceComplianceChromebookAlexa for BusinessWebinarUpdatesHBOBloatwareOperating SysytemCo-Managed ServicesDebateNanotechnologyIdentitiesHelp DeskSecurity CamerasSafetyNFLSabotageTrainingSpecificationsPrint ServerInbound Marketing