toggle accessibility mode
data breach attack

10 Common Data Breach Attack Techniques

Among the more frustrating aspects of cyber security is the constantly evolving nature of the threat and the multitude of data breach attack techniques. One vulnerability is patched only for another to be found/created; one technique is foiled only for a different tactic to arise. Here we give a brief discussion of motivations and offer… READ MORE

data security management

10 Data Security Management Tips to Prevent a Data Breach

You may never suffer a data breach, but that doesn’t mean you shouldn’t know how to prevent one. With the number and severity of data breaches rising every year, it is clear that all of us, from the biggest to the smallest company, could brush up on our data security management. You may never suffer… READ MORE

avoiding data breaches

Avoiding Data Breaches: Lessons From Regulations

In January of 2017, an amendment to the Federal Acquisitions Regulation (“FAR”) went into effect related to protecting private personal information and requiring privacy training for all federal government contractors. The regulations were issued pursuant to The Privacy Act of 1974. 5 U.S.C. § 552a. The Privacy Act governs federal agency collection, maintenance, use, and… READ MORE

data protection officer

Yes, Your Business Needs a Data Protection Officer

On May 28, 2018, new data protections laws and regulations go into effect for the European Union (“EU”). See recent news report here. The new regulations are called the General Data Protection Regulation (“GDPR”). See the full GDPR here. The EU is getting serious about punishing companies that suffer data breaches. For the most serious… READ MORE

SIM Swap Scams Targeting Cryptocurrency Investors

SIM swap scams are nothing new. Telecommunications providers such as Verizon, AT&T, T-Mobile, and Sprint have been aware for over ten years that unauthorized third parties regularly attempt to obtain access to customer subscriber accounts to gain control over a customer’s SIM card. Hackers Gaining Account Control By gaining control over a customer’s SIM card,… READ MORE

ftc dot com disclosure requirements

The FTC Case against EquiFax Inc.

In early September of 2017, it was reported that Equifax Inc., one of the country’s three leading credit reporting services, was subject to a cyberattack that resulted in the access by the hackers of financial and personal information of more than 143 million U.S. consumers. According to Equifax, the hacking occurred from mid-May through July… READ MORE

general data protection regulation

General Data Protection Regulation

Ever since people have started putting information on social media, in the protection of companies, or on their own protected online server, there have been groups of people who attempt to hack this information and use it with ill intentions. Because of the great weight held by the United States and other nations towards personal… READ MORE

Recent Healthcare Data Breaches

Healthcare computer systems harbor the most useful three pieces of personal identifying information that can be used for fraud and identity theft – names, Social Security numbers, and dates of birth. With these three pieces of important and essential personal identifying data, hackers, fraudsters and impersonators can do virtually anything they would like. Increase in… READ MORE

Healthcare Ransomware

Are Healthcare Systems Being Held Hostage by Ransomware?

Healthcare ransomware is one of the biggest cybersecurity concerns in existence and it may have particularly serious implications for healthcare systems. Ransomware is a form of malicious software code that is somehow installed on a computer or provided access to vulnerable system network where the data on the computer or in the network is either… READ MORE

third-party data breaches

Third-Party Data Breaches: Weakest Link in Cybersecurity

One problem that many companies discover as they develop cybersecurity measures is that third-party data breaches is the weakest link in its data management chain. Many companies find it a business necessity to outsource some, if not all, data management, storage, and processing activities to third-party vendors. These vendors may include cloud hosting companies and… READ MORE

Make better decisions for your business, and avoid the online legal traps.

LET'S DISCUSS YOUR CASE