Posts

data breach statistics

Top Data Breaches of 2018: Hackers Find New Methods

We periodically update this post with recent data breach statistics. Now that we’re into 2018, it’s time to look at the top security breaches in 2018, plus review 2017 and previous years. At Revision Legal, we know that cyber-attacks are a constant threat. The number of data breaches is largeWe periodically update this post with recent data breach statistics. Now that we’re into 2018, it’s time to look at the top security breaches in 2018, plus review 2017 and previous years. At Revision Legal, we know that cyber-attacks are a constant threat. The number of data breaches is large

Launch of Swiss-US Privacy Shield Framework Announced by US Secretary of Commerce

International commerce is a huge business, but one of the challenges involved in conducting international business is that different countries may have different laws concerning privacy and the handling of personal data. Many companies in the United States conduct business in Europe, and Europe is well known around the worldInternational commerce is a huge business, but one of the challenges involved in conducting international business is that different countries may have different laws concerning privacy and the handling of personal data. Many companies in the United States conduct business in Europe, and Europe is well known around the world

phishing email

Going Phishing: Malware and It’s Role in Data Breaches

Malware is a malicious type of software code that plays a significant role in data security breaches. Malware is typically deployed through a phishing email message scam. This involves an unsuspecting victim receiving an email message from a fraudulent source, a victim clicks on a nefarious link or opens an attachment ofMalware is a malicious type of software code that plays a significant role in data security breaches. Malware is typically deployed through a phishing email message scam. This involves an unsuspecting victim receiving an email message from a fraudulent source, a victim clicks on a nefarious link or opens an attachment of

prepare for data breaches

Businesses Must Prepare for Data Breaches

Data breaches involving businesses are happening all the time. The best way for a company to deal with a hack is to prepare for data breaches before it happens. It does not matter what size your business is, if hackers can easily access personal information stored in your company’s system, they willData breaches involving businesses are happening all the time. The best way for a company to deal with a hack is to prepare for data breaches before it happens. It does not matter what size your business is, if hackers can easily access personal information stored in your company’s system, they will