data security management

10 Data Security Management Tips to Prevent a Data Breach

You may never suffer a data breach, but that doesn’t mean you shouldn’t know how to prevent one. With recent news of a data breach of 1.5 billion Yahoo accounts, it is clear that all of us, from the biggest to the smallest company, could brush up on our dataYou may never suffer a data breach, but that doesn’t mean you shouldn’t know how to prevent one. With recent news of a data breach of 1.5 billion Yahoo accounts, it is clear that all of us, from the biggest to the smallest company, could brush up on our data

california data breach notification law

California Data Breach Notification Law

California law takes the privacy of its residents seriously. Privacy is an inalienable right guaranteed to California residents by the California Constitution. It was the first state to enact laws protecting the rights of Californians to be notified of data security breaches. When it comes to data breaches in California, state agenciesCalifornia law takes the privacy of its residents seriously. Privacy is an inalienable right guaranteed to California residents by the California Constitution. It was the first state to enact laws protecting the rights of Californians to be notified of data security breaches. When it comes to data breaches in California, state agencies

Data Breach

8 Reasons You Need a Data Breach Attorney

With growth in digital data has come a growth in data breaches. The need for greater protection means you need a data breach attorney. Data breaches aren’t restricted to hackers gaining access to your electronic data. It can also apply to people gaining access to printed materials. Negligence may beWith growth in digital data has come a growth in data breaches. The need for greater protection means you need a data breach attorney. Data breaches aren’t restricted to hackers gaining access to your electronic data. It can also apply to people gaining access to printed materials. Negligence may be

Discover Data Security Breaches

Employees Most Likely to Discover Data Security Breaches

One thing that all data security breaches have in common is that someone must first uncover the breach and then reveal the breach to the appropriate parties (i.e., employers, law enforcement, other appropriate state and federal agencies, etc.). In the case of a business that is attacked and breached, anOne thing that all data security breaches have in common is that someone must first uncover the breach and then reveal the breach to the appropriate parties (i.e., employers, law enforcement, other appropriate state and federal agencies, etc.). In the case of a business that is attacked and breached, an

data security breaches

America First! (in Data Security Breaches)

In the United States we pride ourselves on being world leaders, but not when it comes to the number of data security breaches that we fall victim to. According to a report published by The Hill, the United States outpaced the rest of the world concerning the number of dataIn the United States we pride ourselves on being world leaders, but not when it comes to the number of data security breaches that we fall victim to. According to a report published by The Hill, the United States outpaced the rest of the world concerning the number of data

medjacking

NH Strengthens Healthcare Cybersecurity in Response to 2015 Hack

In New Hampshire, state officials are diligently working to update and strengthen the state’s computer systems against breaches after there was a cybersecurity breach in 2015 involving the New Hampshire Department of Health and Human Services (DHHS). The DHHS press release regarding the data breach can be found here. AccordingIn New Hampshire, state officials are diligently working to update and strengthen the state’s computer systems against breaches after there was a cybersecurity breach in 2015 involving the New Hampshire Department of Health and Human Services (DHHS). The DHHS press release regarding the data breach can be found here. According

business after a data breach

How Do Customers Perceive Businesses After a Data Breach?

Nothing can be quite as devastating to a business’s customer base than a data breach. How do customers perceive businesses after a data breach? What was once a highly-trusted, well-regarded company could be quickly downgraded to an untrustworthy, irresponsible company after a data breach. The public generally perceives data breaches as aNothing can be quite as devastating to a business’s customer base than a data breach. How do customers perceive businesses after a data breach? What was once a highly-trusted, well-regarded company could be quickly downgraded to an untrustworthy, irresponsible company after a data breach. The public generally perceives data breaches as a

small business cyber security

Cyber Attacks are on the Rise for Small Businesses

Cyber security is something that small businesses should take seriously. Many small businesses tend to neglect cyber security because they typically do not think that they are a target for hackers. However, the number of cyber attacks made on small business entities has been on the rise for the pastCyber security is something that small businesses should take seriously. Many small businesses tend to neglect cyber security because they typically do not think that they are a target for hackers. However, the number of cyber attacks made on small business entities has been on the rise for the past

Breach Notification Laws Impose High Penalties

When there is a data security breach, there are state and federal data breach notification laws that places time limits on when those who are affected must be notified. A failure to make a timely notification of the data breach can be quite costly. Several state data breach notification lawsWhen there is a data security breach, there are state and federal data breach notification laws that places time limits on when those who are affected must be notified. A failure to make a timely notification of the data breach can be quite costly. Several state data breach notification laws

internet of things ransomware

Is Your Smart TV at Risk of a Ransomware Cyberattack?

As the number of physical devices that are connected to the internet increases so too does the threat of cyberattacks on physical devices that are part of the Internet of Things. Practically everything that has electronics nowadays is connected online in what is known as the Internet of Things. Vehicles,As the number of physical devices that are connected to the internet increases so too does the threat of cyberattacks on physical devices that are part of the Internet of Things. Practically everything that has electronics nowadays is connected online in what is known as the Internet of Things. Vehicles,