yahoo data breach

Yahoo Data Beach: One Billion Users Exposed

The Yahoo data breach is one of the largest cyber security hacks to happen to date. Yahoo recently announced that it was the victim of a cyber attack in August of 2013, and this revelation could have an impact on Yahoo’s potential sale to Verizon. Yahoo revealed that more than oneThe Yahoo data breach is one of the largest cyber security hacks to happen to date. Yahoo recently announced that it was the victim of a cyber attack in August of 2013, and this revelation could have an impact on Yahoo’s potential sale to Verizon. Yahoo revealed that more than one

cyber security best practices

Cyber Security Best Practices

Attention to Detail and Diligence are Critical When Dealing with Cyber Security If the data breaches of the last couple of years are any indication, cyber security and data breaches will continue to make headlines in 2017. Most data security breaches are the result of an oversight somewhere in theAttention to Detail and Diligence are Critical When Dealing with Cyber Security If the data breaches of the last couple of years are any indication, cyber security and data breaches will continue to make headlines in 2017. Most data security breaches are the result of an oversight somewhere in the

popcorn time ransomware

New Ransomware Offers Victims a Hobson’s Choice: Pay Up or Infect Two Colleagues

There is a new ransomware making the rounds that offers victims a Hobson’s choice: Popcorn Time ransomware. This ransomware gives the victim a choice: either pay the ransom amount to gain access to his or her data, or choose to pass the ransomware on to two unsuspecting colleagues. It hardlyThere is a new ransomware making the rounds that offers victims a Hobson’s choice: Popcorn Time ransomware. This ransomware gives the victim a choice: either pay the ransom amount to gain access to his or her data, or choose to pass the ransomware on to two unsuspecting colleagues. It hardly

new york cybersecurity regulations

New York Imposes New Cybersecurity Regulations

Effective January 1, 2017, banks, financial institutions, and insurance companies in New York will be required to comply with new cybersecurity regulations. The New York cybersecurity regulations are closely aligned with the Center of Internet Safety’s 20 CIS Controls. The CIS controls are the industry standard when it comes to cybersecurity andEffective January 1, 2017, banks, financial institutions, and insurance companies in New York will be required to comply with new cybersecurity regulations. The New York cybersecurity regulations are closely aligned with the Center of Internet Safety’s 20 CIS Controls. The CIS controls are the industry standard when it comes to cybersecurity and

quest diagnostics data breach

Quest Diagnostics Data Breach: Another Healthcare Hack

The Quest Diagnostics data breach is the most recent health care entity to be affected by security hack in 2016. In late November, Quest Diagnostic, a medical laboratory company used by countless health care entities nationwide, announced that it had recently identified itself as a victim of a data breach. AccordingThe Quest Diagnostics data breach is the most recent health care entity to be affected by security hack in 2016. In late November, Quest Diagnostic, a medical laboratory company used by countless health care entities nationwide, announced that it had recently identified itself as a victim of a data breach. According

phishing email

Going Phishing: Malware and It’s Role in Data Breaches

Malware is a malicious type of software code that plays a significant role in data security breaches. Malware is typically deployed through a phishing email message scam. This involves an unsuspecting victim receiving an email message from a fraudulent source, a victim clicks on a nefarious link or opens an attachment ofMalware is a malicious type of software code that plays a significant role in data security breaches. Malware is typically deployed through a phishing email message scam. This involves an unsuspecting victim receiving an email message from a fraudulent source, a victim clicks on a nefarious link or opens an attachment of

military data breach

OPM and U.S. Military Data Breaches

In the hacking world, a few of the most favored data breach targets include governmental agencies and militaries. Whether it is the challenge of hacking these presumably highly secure entities, or the thrill and notoriety associated with a successful hack, governments and militaries are constantly subjected to cyber threats. InIn the hacking world, a few of the most favored data breach targets include governmental agencies and militaries. Whether it is the challenge of hacking these presumably highly secure entities, or the thrill and notoriety associated with a successful hack, governments and militaries are constantly subjected to cyber threats. In

data breach notification laws

What are Data Breach Notification Laws?

What are data breach notification laws? Many people have heard about, or have themselves been potentially victimized by a data breach. Your credit card information might have been hacked, or your personal identifying information might have been exposed in a data security breach. But many people do not realize thatWhat are data breach notification laws? Many people have heard about, or have themselves been potentially victimized by a data breach. Your credit card information might have been hacked, or your personal identifying information might have been exposed in a data security breach. But many people do not realize that

prepare for data breaches

Businesses Must Prepare for Data Breaches

Data breaches involving businesses are happening all the time. The best way for a company to deal with a hack is to prepare for data breaches before it happens. It does not matter what size your business is, if hackers can easily access personal information stored in your company’s system, they willData breaches involving businesses are happening all the time. The best way for a company to deal with a hack is to prepare for data breaches before it happens. It does not matter what size your business is, if hackers can easily access personal information stored in your company’s system, they will

credit card breach madison square gardens

Latest Credit Card Breach: Madison Square Gardens

Madison Square Garden and a small number of other major entertainment venues owned by Madison Square Garden Co. recently announced that their payment systems were hacked for a year-long period. Credit card information of customers who visited the affected establishments may have been breached. According to Gizmodo.com, Madison Square Garden,Madison Square Garden and a small number of other major entertainment venues owned by Madison Square Garden Co. recently announced that their payment systems were hacked for a year-long period. Credit card information of customers who visited the affected establishments may have been breached. According to Gizmodo.com, Madison Square Garden,