Posts

data security management

10 Data Security Management Tips to Prevent a Data Breach

You may never suffer a data breach, but that doesn’t mean you shouldn’t know how to prevent one. With recent news of a data breach of 1.5 billion Yahoo accounts, it is clear that all of us, from the biggest to the smallest company, could brush up on our dataYou may never suffer a data breach, but that doesn’t mean you shouldn’t know how to prevent one. With recent news of a data breach of 1.5 billion Yahoo accounts, it is clear that all of us, from the biggest to the smallest company, could brush up on our data

california data breach notification law

California Data Breach Notification Law

California law takes the privacy of its residents seriously. Privacy is an inalienable right guaranteed to California residents by the California Constitution. It was the first state to enact laws protecting the rights of Californians to be notified of data security breaches. When it comes to data breaches in California, state agenciesCalifornia law takes the privacy of its residents seriously. Privacy is an inalienable right guaranteed to California residents by the California Constitution. It was the first state to enact laws protecting the rights of Californians to be notified of data security breaches. When it comes to data breaches in California, state agencies

Data Breach

8 Reasons You Need a Data Breach Attorney

With growth in digital data has come a growth in data breaches. The need for greater protection means you need a data breach attorney. Data breaches aren’t restricted to hackers gaining access to your electronic data. It can also apply to people gaining access to printed materials. Negligence may beWith growth in digital data has come a growth in data breaches. The need for greater protection means you need a data breach attorney. Data breaches aren’t restricted to hackers gaining access to your electronic data. It can also apply to people gaining access to printed materials. Negligence may be

chipped credit card fraud

Are New Chipped Credit Cards Really Safe From Fraud?

Recent reports have indicated that the new chipped credit cards, i.e., credit and debit payment cards equipped with EMV technology, are not as secure as initially hoped, and show that fraud involving payment cards is still on the rise despite the full deployment of the new, more secure technology. TheRecent reports have indicated that the new chipped credit cards, i.e., credit and debit payment cards equipped with EMV technology, are not as secure as initially hoped, and show that fraud involving payment cards is still on the rise despite the full deployment of the new, more secure technology. The

active cyber attacks

Active vs Passive Cyber Attacks Explained

Cyber attacks involve the unauthorized access of private or confidential information contained on computer systems or networks, but the techniques and methods used by the attacker further distinguish whether the attack is an active cyber attack, a passive type attack, or some combination of the two. According to Symantec, both activeCyber attacks involve the unauthorized access of private or confidential information contained on computer systems or networks, but the techniques and methods used by the attacker further distinguish whether the attack is an active cyber attack, a passive type attack, or some combination of the two. According to Symantec, both active

advanced persistent threats

What are Advanced Persistent Threats?

In cyber security, an undetected attack by which someone gains unauthorized access to a network or system for an extended period of time is referred to as an advanced persistent threat. It is a form of security data breach whereby the attacker has gained access to the system and isIn cyber security, an undetected attack by which someone gains unauthorized access to a network or system for an extended period of time is referred to as an advanced persistent threat. It is a form of security data breach whereby the attacker has gained access to the system and is

Discover Data Security Breaches

Employees Most Likely to Discover Data Security Breaches

One thing that all data security breaches have in common is that someone must first uncover the breach and then reveal the breach to the appropriate parties (i.e., employers, law enforcement, other appropriate state and federal agencies, etc.). In the case of a business that is attacked and breached, anOne thing that all data security breaches have in common is that someone must first uncover the breach and then reveal the breach to the appropriate parties (i.e., employers, law enforcement, other appropriate state and federal agencies, etc.). In the case of a business that is attacked and breached, an

data security breaches

America First! (in Data Security Breaches)

In the United States we pride ourselves on being world leaders, but not when it comes to the number of data security breaches that we fall victim to. According to a report published by The Hill, the United States outpaced the rest of the world concerning the number of dataIn the United States we pride ourselves on being world leaders, but not when it comes to the number of data security breaches that we fall victim to. According to a report published by The Hill, the United States outpaced the rest of the world concerning the number of data

medjacking

NH Strengthens Healthcare Cybersecurity in Response to 2015 Hack

In New Hampshire, state officials are diligently working to update and strengthen the state’s computer systems against breaches after there was a cybersecurity breach in 2015 involving the New Hampshire Department of Health and Human Services (DHHS). The DHHS press release regarding the data breach can be found here. AccordingIn New Hampshire, state officials are diligently working to update and strengthen the state’s computer systems against breaches after there was a cybersecurity breach in 2015 involving the New Hampshire Department of Health and Human Services (DHHS). The DHHS press release regarding the data breach can be found here. According

business after a data breach

How Do Customers Perceive Businesses After a Data Breach?

Nothing can be quite as devastating to a business’s customer base than a data breach. How do customers perceive businesses after a data breach? What was once a highly-trusted, well-regarded company could be quickly downgraded to an untrustworthy, irresponsible company after a data breach. The public generally perceives data breaches as aNothing can be quite as devastating to a business’s customer base than a data breach. How do customers perceive businesses after a data breach? What was once a highly-trusted, well-regarded company could be quickly downgraded to an untrustworthy, irresponsible company after a data breach. The public generally perceives data breaches as a