Top Concern: The Prospect of a Big Data Breach, New Report Shows

According to a new survey by Advisen, that was commissioned by ID Experts, a majority of organizations are really concerned at the prospect of a big data breach. With the ever evolving cybersecurity landscape and advancing cyber criminal attacks, data breaches should be #1 on every company’s radar. This enlightening survey highlights several key findings, […]

Read full story Comments { 0 }

When the “Big One” Hits – Are We Prepared?

Similar to being prepared for an earthquake, we must be prepared for when cyber criminals finally take a shot (and succeed) at taking down our entire energy and utility infrastructure. A few years ago, an attack on our grid sounded like something out of a post-apocalyptic science fiction novel, but now…it’s a grim, realistic possibility. […]

Read full story Comments { 0 }

The Government’s Tight Budget – Will Privacy, Security & Customer Experience Prevail?

When it comes to healthcare, the government is on the hook to increase digital security and customer privacy; but when you factory in budget, they’re walking a tight rope and must figure out how to balance security and privacy without going over-budget. It’s definitely not impossible, but it’s no cake walk either. Especially in the […]

Read full story Comments { 0 }

Is Your FitBit a Key for Criminals?

When it comes to privacy and security vs. cool and convenient, cool and convenient tend to win leaving privacy and security in the dust. Today, there’s a culture, and almost cult-like following, of wearable devices that can answer your phone calls, track your heart rate and number of steps, respond to text messages, find cafes […]

Read full story Comments { 0 }

Just How Scary are IoT and Big Data?

Big Data and the Internet of Things are here to stay. While a boon to some, they’re trouble makers to others. The Internet of Things tends to make Big Data even bigger – not to mention riskier: “If we had computers that knew everything there was to know about things—using data they gathered without any […]

Read full story Comments { 0 }

University of Central Florida – Hack that Exposed Thousands of Students’ & Employees’ PII

While the Healthcare industry may still be huge target for cyber criminals, Educational Institutions (i.e. colleges, universities, etc) aren’t far behind on the Hacker Hit List. The data that both industries keep on their constituents is a treasure trove to hackers that they can easily monetize on the Dark Web. Without the proper cyber security […]

Read full story Comments { 0 }

Nipping Employee Negligence in the Bud

Year after year, employee negligence remains a big concern for privacy and security professionals alike. In ID Experts’ 2015 Privacy and Security survey, more than 60% of privacy and security professionals listed employee negligence as a top concern, while criminal attacks/cyber criminals took a back seat. Here’s 4 steps to help mitigate the employee negligence […]

Read full story Comments { 0 }

What’s the Problem With Forgotten Data?…EVERYTHING!

Regardless of industry, business deal with tons of data on a daily basis. Have you ever wondered what happens to that data? It’s used, filed away and forgotten — but what does that mean in relation to your business down the road? A majority of today’s data breaches involve forgotten data, which means it’s that […]

Read full story Comments { 0 }

Building Cyber Breach Resilience in a Nutshell

Data breaches are still all over the headlines, and there’s no sign of breaches stopping any time soon. Cyber criminals use all sorts of methods to gain access to systems, but a common finding is that human error is the cause of many larger breaches. By human error, we mean by accidentally being fooled into […]

Read full story Comments { 0 }

How to Choose the Right Data Breach Response Vendor

When it comes to selecting a breach response vendor, there’s a few things to keep in mind that your selected vendor must have in order to lead and execute a successful response. How to choose the right data breach response vendor: Data breaches have become an everyday cost of doing business. A proper response can […]

Read full story Comments { 0 }