Archive | Data Breach Resources RSS feed for this section

What’s the Problem With Forgotten Data?…EVERYTHING!

Regardless of industry, business deal with tons of data on a daily basis. Have you ever wondered what happens to that data? It’s used, filed away and forgotten — but what does that mean in relation to your business down the road? A majority of today’s data breaches involve forgotten data, which means it’s that […]

Read full story Comments { 0 }

Building Cyber Breach Resilience in a Nutshell

Data breaches are still all over the headlines, and there’s no sign of breaches stopping any time soon. Cyber criminals use all sorts of methods to gain access to systems, but a common finding is that human error is the cause of many larger breaches. By human error, we mean by accidentally being fooled into […]

Read full story Comments { 0 }

The Internet of Things: Time to Get Smart About Security

The Internet of Things (IoT) is inevitable and it’s a doozie. IoT technology is outpacing security; and regardless of whether you’re using connected industrial controllers, cloud technology or smart technology, you and your staff are using an increasing number of devices that can put your business in danger.  Cell phones, FitBits, baby monitors, smart watches, […]

Read full story Comments { 0 }

Surprise, Surprise- Humans are a Data Security Nightmare

Otherwise known as employee negligence, most organizations still feel as though human error is their top threat to information security (cyber criminals came in second). While humans can’t be error-proofed any more than technology can, there are a few steps you can take to help your workforce, customers and vendors keep your organization and its […]

Read full story Comments { 0 }

Ponemon Releases Fifth Annual Study on Healthcare Data Breaches

Ponemon has release it’s fifth annual study on healthcare data breaches and it has some interesting data. The Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data, sponsored by ID Experts, shows that, for the first time, criminal attacks are the number-one root cause of healthcare data breaches. We calculated a 125 percent […]

Read full story Comments { 0 }

Malicious Attacks now Leading Cause of Healthcare Data Breaches

A new study by the Ponemon Institute and ID Experts reveals a trend that has the Healthcare industry on edge. For the first year in it’s five years of reporting, malicious criminal attacks now lead the pack for healthcare data breach causes – previously, unintentional events/accidents were the leading cause of healthcare breaches. This comes […]

Read full story Comments { 0 }

Updated Breach Response Plan for 2015

Have you updated your data breach response plans for 2015? When your organization suspects a data privacy or security incident has occurred, you must act quickly to initiate and manage your response. The process tends to be complex, stressful and “high stakes” given that your customers or patients are affected and your reputation is at […]

Read full story Comments { 0 }

Data Incident Response – You’re Doing it Wrong!

Using a GRC platform, spreadsheet or homegrown system to manage your privacy and security incident response?  You’re doing it wrong!  You need the right tool for the job! About five years ago I walked into a fly fishing shop near me looking for some flies.  At the time I didn’t know much about fly fishing, […]

Read full story Comments { 0 }

Breach Risk Assessment Decision Process – Software Vs. Paper

WEDI released its most recent Data Breach Notification Decision Process document, an update with Final HIPAA Omnibus Rule Breach Notification changes, but something strange stands out.  Why is an organization which is focused on “electronic data interchange” recommending a paper process?  Do you complete your taxes on paper?  Does your accountant prepare anything on paper?  […]

Read full story Comments { 0 }

State Requirements in the Data Breach Notification Letter: Don’t forget to include tips

This “Data Breach Response – How To” article is part of our larger series by Heather Noonan.  This was originally posted here. Maryland? California? New York or was it Nebraska? Maybe it was Florida? Keeping data breach laws and regulations organized by state can be a very daunting and confusing task. For example in Massachusetts, […]

Read full story Comments { 0 }