University of Central Florida – Hack that Exposed Thousands of Students’ & Employees’ PII

While the Healthcare industry may still be huge target for cyber criminals, Educational Institutions (i.e. colleges, universities, etc) aren’t far behind on the Hacker Hit List. The data that both industries keep on their constituents is a treasure trove to hackers that they can easily monetize on the Dark Web. Without the proper cyber security […]

Read full story Comments { 0 }

Nipping Employee Negligence in the Bud

Year after year, employee negligence remains a big concern for privacy and security professionals alike. In ID Experts’ 2015 Privacy and Security survey, more than 60% of privacy and security professionals listed employee negligence as a top concern, while criminal attacks/cyber criminals took a back seat. Here’s 4 steps to help mitigate the employee negligence […]

Read full story Comments { 0 }

What’s the Problem With Forgotten Data?…EVERYTHING!

Regardless of industry, business deal with tons of data on a daily basis. Have you ever wondered what happens to that data? It’s used, filed away and forgotten — but what does that mean in relation to your business down the road? A majority of today’s data breaches involve forgotten data, which means it’s that […]

Read full story Comments { 0 }

Building Cyber Breach Resilience in a Nutshell

Data breaches are still all over the headlines, and there’s no sign of breaches stopping any time soon. Cyber criminals use all sorts of methods to gain access to systems, but a common finding is that human error is the cause of many larger breaches. By human error, we mean by accidentally being fooled into […]

Read full story Comments { 0 }

How to Choose the Right Data Breach Response Vendor

When it comes to selecting a breach response vendor, there’s a few things to keep in mind that your selected vendor must have in order to lead and execute a successful response. How to choose the right data breach response vendor: Data breaches have become an everyday cost of doing business. A proper response can […]

Read full story Comments { 0 }

Millennials – Tech Savvy & Lazy With Security

Millennials have officially surpassed baby boomers as the largest generation in the workforce, and were practically born with technology in their hands. Millennials have been connected from a very young age and are incredibly technology savvy – but why are they the laziest when it comes to security of their devices and data? Here are […]

Read full story Comments { 0 }

The Internet of Things: Time to Get Smart About Security

The Internet of Things (IoT) is inevitable and it’s a doozie. IoT technology is outpacing security; and regardless of whether you’re using connected industrial controllers, cloud technology or smart technology, you and your staff are using an increasing number of devices that can put your business in danger.  Cell phones, FitBits, baby monitors, smart watches, […]

Read full story Comments { 0 }

The Top 10 Worst Data Breaches of 2015

In 2015, we saw some of the worst data breaches in history. From Anthem and Ashley Madison, to the U.S. Office of Personnel Management and Harvard, millions upon millions of records compromised. In other sad news, those were only data breaches that affected the United States; Russia and Turkey both suffered massive data breaches, exposing […]

Read full story Comments { 0 }

November Data Breach Monthly Update: We Keep Tabs On Companies That Have Been Hacked (So You Don’t Have To)

Identity theft is everywhere. According to the most recent data from Identity Theft Resource Center, there have been 629 data breaches so far in 2015, resulting in the unlawful exposure of 175,638,537 personal identities. Let’s run through some of the recent violations, many of which have made headlines in newspapers from coast to coast, due […]

Read full story Comments { 0 }

Surprise, Surprise- Humans are a Data Security Nightmare

Otherwise known as employee negligence, most organizations still feel as though human error is their top threat to information security (cyber criminals came in second). While humans can’t be error-proofed any more than technology can, there are a few steps you can take to help your workforce, customers and vendors keep your organization and its […]

Read full story Comments { 0 }