Posts

chipped credit card fraud

Are New Chipped Credit Cards Really Safe From Fraud?

Recent reports have indicated that the new chipped credit cards, i.e., credit and debit payment cards equipped with EMV technology, are not as secure as initially hoped, and show that fraud involving payment cards is still on the rise despite the full deployment of the new, more secure technology. TheRecent reports have indicated that the new chipped credit cards, i.e., credit and debit payment cards equipped with EMV technology, are not as secure as initially hoped, and show that fraud involving payment cards is still on the rise despite the full deployment of the new, more secure technology. The

active cyber attacks

Active vs Passive Cyber Attacks Explained

Cyber attacks involve the unauthorized access of private or confidential information contained on computer systems or networks, but the techniques and methods used by the attacker further distinguish whether the attack is an active cyber attack, a passive type attack, or some combination of the two. According to Symantec, both activeCyber attacks involve the unauthorized access of private or confidential information contained on computer systems or networks, but the techniques and methods used by the attacker further distinguish whether the attack is an active cyber attack, a passive type attack, or some combination of the two. According to Symantec, both active

advanced persistent threats

What are Advanced Persistent Threats?

In cyber security, an undetected attack by which someone gains unauthorized access to a network or system for an extended period of time is referred to as an advanced persistent threat. It is a form of security data breach whereby the attacker has gained access to the system and isIn cyber security, an undetected attack by which someone gains unauthorized access to a network or system for an extended period of time is referred to as an advanced persistent threat. It is a form of security data breach whereby the attacker has gained access to the system and is

Discover Data Security Breaches

Employees Most Likely to Discover Data Security Breaches

One thing that all data security breaches have in common is that someone must first uncover the breach and then reveal the breach to the appropriate parties (i.e., employers, law enforcement, other appropriate state and federal agencies, etc.). In the case of a business that is attacked and breached, anOne thing that all data security breaches have in common is that someone must first uncover the breach and then reveal the breach to the appropriate parties (i.e., employers, law enforcement, other appropriate state and federal agencies, etc.). In the case of a business that is attacked and breached, an

data security breaches

America First! (in Data Security Breaches)

In the United States we pride ourselves on being world leaders, but not when it comes to the number of data security breaches that we fall victim to. According to a report published by The Hill, the United States outpaced the rest of the world concerning the number of dataIn the United States we pride ourselves on being world leaders, but not when it comes to the number of data security breaches that we fall victim to. According to a report published by The Hill, the United States outpaced the rest of the world concerning the number of data

medjacking

NH Strengthens Healthcare Cybersecurity in Response to 2015 Hack

In New Hampshire, state officials are diligently working to update and strengthen the state’s computer systems against breaches after there was a cybersecurity breach in 2015 involving the New Hampshire Department of Health and Human Services (DHHS). The DHHS press release regarding the data breach can be found here. AccordingIn New Hampshire, state officials are diligently working to update and strengthen the state’s computer systems against breaches after there was a cybersecurity breach in 2015 involving the New Hampshire Department of Health and Human Services (DHHS). The DHHS press release regarding the data breach can be found here. According

business after a data breach

How Do Customers Perceive Businesses After a Data Breach?

Nothing can be quite as devastating to a business’s customer base than a data breach. How do customers perceive businesses after a data breach? What was once a highly-trusted, well-regarded company could be quickly downgraded to an untrustworthy, irresponsible company after a data breach. The public generally perceives data breaches as aNothing can be quite as devastating to a business’s customer base than a data breach. How do customers perceive businesses after a data breach? What was once a highly-trusted, well-regarded company could be quickly downgraded to an untrustworthy, irresponsible company after a data breach. The public generally perceives data breaches as a

small business cyber security

Cyber Attacks are on the Rise for Small Businesses

Cyber security is something that small businesses should take seriously. Many small businesses tend to neglect cyber security because they typically do not think that they are a target for hackers. However, the number of cyber attacks made on small business entities has been on the rise for the pastCyber security is something that small businesses should take seriously. Many small businesses tend to neglect cyber security because they typically do not think that they are a target for hackers. However, the number of cyber attacks made on small business entities has been on the rise for the past

Breach Notification Laws Impose High Penalties

When there is a data security breach, there are state and federal data breach notification laws that places time limits on when those who are affected must be notified. A failure to make a timely notification of the data breach can be quite costly. Several state data breach notification lawsWhen there is a data security breach, there are state and federal data breach notification laws that places time limits on when those who are affected must be notified. A failure to make a timely notification of the data breach can be quite costly. Several state data breach notification laws

internet of things ransomware

Is Your Smart TV at Risk of a Ransomware Cyberattack?

As the number of physical devices that are connected to the internet increases so too does the threat of cyberattacks on physical devices that are part of the Internet of Things. Practically everything that has electronics nowadays is connected online in what is known as the Internet of Things. Vehicles,As the number of physical devices that are connected to the internet increases so too does the threat of cyberattacks on physical devices that are part of the Internet of Things. Practically everything that has electronics nowadays is connected online in what is known as the Internet of Things. Vehicles,