data protection officer

Yes, Your Business Needs a Data Protection Officer

On May 28, 2018, new data protections laws and regulations go into effect for the European Union (“EU”). See recent news report here. The new regulations are called the General Data Protection Regulation (“GDPR”). See the full GDPR here. The EU is getting serious about punishing companies that suffer dataOn May 28, 2018, new data protections laws and regulations go into effect for the European Union (“EU”). See recent news report here. The new regulations are called the General Data Protection Regulation (“GDPR”). See the full GDPR here. The EU is getting serious about punishing companies that suffer data

hacking statistics

2017 Security Breaches: Frequency and Severity on the Rise

We periodically update this post with recent data breach statistics. Now that we’re into the final quarter of 2017, it’s time to look back at the largest data breaches of 2017. We shouldn’t be surprised at the number of security breaches that have already happened in 2017, looking back atWe periodically update this post with recent data breach statistics. Now that we’re into the final quarter of 2017, it’s time to look back at the largest data breaches of 2017. We shouldn’t be surprised at the number of security breaches that have already happened in 2017, looking back at

SIM Swap Scams Targeting Cryptocurrency Investors

SIM swap scams are nothing new. Telecommunications providers such as Verizon, AT&T, T-Mobile, and Sprint have been aware for over ten years that unauthorized third parties regularly attempt to obtain access to customer subscriber accounts to gain control over a customer’s SIM card. Hackers Gaining Account Control By gaining controlSIM swap scams are nothing new. Telecommunications providers such as Verizon, AT&T, T-Mobile, and Sprint have been aware for over ten years that unauthorized third parties regularly attempt to obtain access to customer subscriber accounts to gain control over a customer’s SIM card. Hackers Gaining Account Control By gaining control

ftc dot com disclosure requirements

The FTC Case against EquiFax Inc.

In early September of 2017, it was reported that Equifax Inc., one of the country’s three leading credit reporting services, was subject to a cyberattack that resulted in the access by the hackers of financial and personal information of more than 143 million U.S. consumers. According to Equifax, the hackingIn early September of 2017, it was reported that Equifax Inc., one of the country’s three leading credit reporting services, was subject to a cyberattack that resulted in the access by the hackers of financial and personal information of more than 143 million U.S. consumers. According to Equifax, the hacking

general data protection regulation

General Data Protection Regulation

Ever since people have started putting information on social media, in the protection of companies, or on their own protected online server, there have been groups of people who attempt to hack this information and use it with ill intentions. Because of the great weight held by the United StatesEver since people have started putting information on social media, in the protection of companies, or on their own protected online server, there have been groups of people who attempt to hack this information and use it with ill intentions. Because of the great weight held by the United States

Recent Healthcare Data Breaches

Healthcare computer systems harbor the most useful three pieces of personal identifying information that can be used for fraud and identity theft – names, Social Security numbers, and dates of birth. With these three pieces of important and essential personal identifying data, hackers, fraudsters and impersonators can do virtually anythingHealthcare computer systems harbor the most useful three pieces of personal identifying information that can be used for fraud and identity theft – names, Social Security numbers, and dates of birth. With these three pieces of important and essential personal identifying data, hackers, fraudsters and impersonators can do virtually anything

Healthcare Ransomware

Are Healthcare Systems Being Held Hostage by Ransomware?

Healthcare ransomware is one of the biggest cybersecurity concerns in existence and it may have particularly serious implications for healthcare systems. Ransomware is a form of malicious software code that is somehow installed on a computer or provided access to vulnerable system network where the data on the computer orHealthcare ransomware is one of the biggest cybersecurity concerns in existence and it may have particularly serious implications for healthcare systems. Ransomware is a form of malicious software code that is somehow installed on a computer or provided access to vulnerable system network where the data on the computer or

third-party data breaches

Third-Party Data Breaches: Weakest Link in Cybersecurity

One problem that many companies discover as they develop cybersecurity measures is that third-party data breaches is the weakest link in its data management chain. Many companies find it a business necessity to outsource some, if not all, data management, storage, and processing activities to third-party vendors. These vendors mayOne problem that many companies discover as they develop cybersecurity measures is that third-party data breaches is the weakest link in its data management chain. Many companies find it a business necessity to outsource some, if not all, data management, storage, and processing activities to third-party vendors. These vendors may

zero-day vulnerability

What is a Zero-Day Vulnerability?

In the realm of cyber security there are many types of attacks and vulnerability exploits that can be used by hackers to gain unauthorized access to computer systems: viruses, Trojans, malware, ransomware, phishing, and a number of different software vulnerabilities. So, what exactly is a zero-day vulnerability and what makesIn the realm of cyber security there are many types of attacks and vulnerability exploits that can be used by hackers to gain unauthorized access to computer systems: viruses, Trojans, malware, ransomware, phishing, and a number of different software vulnerabilities. So, what exactly is a zero-day vulnerability and what makes

New Mexico data breach notification

New Mexico Enacts New Data Breach Notification Laws

New Mexico recently became the 48th state in the US to adopt data breach notification laws. The new laws take effect June 16, 2017 and will apply in all situations in which a data breach occurs, i.e., an unauthorized attempt to access unencrypted or encrypted computerized data. In addition toNew Mexico recently became the 48th state in the US to adopt data breach notification laws. The new laws take effect June 16, 2017 and will apply in all situations in which a data breach occurs, i.e., an unauthorized attempt to access unencrypted or encrypted computerized data. In addition to