Archive | How To RSS feed for this section

What Scams Are We Expecting to See in 2017?

Every new year holds new and different scams than the year before it. In 2017, MyIDCare has predicted a handful of scams that will come about in 2017; some new, some old. Read on and learn how to protect yourself in the coming year. Every new year brings with it new hope, new plans … […]

Read full story Comments { 0 }

New Survey: Customers Come First in Breach Response

According to a new study from ID Experts, the customer should always come first when it comes to breach response. By not focusing on the customer, there’s far more to lose than just money- your reputation is on the line. To date, more than 34 million records have been breached in 2016, according to the […]

Read full story Comments { 0 }

Privacy & Security Certifications – Which Ones Are Right For You?

When it comes to getting privacy or security certifications, there’s a ton of options, but which one is right for you? ISACA, International Association of Privacy Professionals (IAPP), The International Information System Security Certification Consortium ((ISC)2), and the Compliance Certification Board (CCB) are only a few of the associations that offer certifications. If you consider […]

Read full story Comments { 0 }

Nipping Employee Negligence in the Bud

Year after year, employee negligence remains a big concern for privacy and security professionals alike. In ID Experts’ 2015 Privacy and Security survey, more than 60% of privacy and security professionals listed employee negligence as a top concern, while criminal attacks/cyber criminals took a back seat. Here’s 4 steps to help mitigate the employee negligence […]

Read full story Comments { 0 }

What’s the Problem With Forgotten Data?…EVERYTHING!

Regardless of industry, business deal with tons of data on a daily basis. Have you ever wondered what happens to that data? It’s used, filed away and forgotten — but what does that mean in relation to your business down the road? A majority of today’s data breaches involve forgotten data, which means it’s that […]

Read full story Comments { 0 }

How to Respond to a Data Breach in the Cloud

A data breach at your cloud storage provider is a serious breach response challenge.  As more and more organizations more data to the decentralized places like cloud storage, the implications on data breach response are enormous.  One of the first pieces of data breach response, digital forensics investigation, becomes a huge technical issue.  Seth Berman, […]

Read full story Comments { 0 }

Devleoping a data breach informational website that helps people become more self-sufficient

This “Data Breach Response – How To” article is part of our larger series by Heather Noonan. Informational website? What is that? Well, if you don’t mind, I’m going to recommend it.  It’s a definite must have for any data breach response. You will find that most people today turn to the internet to find […]

Read full story Comments { 0 }

State Requirements in the Data Breach Notification Letter: Don’t forget to include tips

This “Data Breach Response – How To” article is part of our larger series by Heather Noonan.  This was originally posted here. Maryland? California? New York or was it Nebraska? Maybe it was Florida? Keeping data breach laws and regulations organized by state can be a very daunting and confusing task. For example in Massachusetts, […]

Read full story Comments { 0 }

How to determine the tone of a data breach notification letter

This “Data Breach Response – How To” article is part of our larger series by Heather Noonan. Remember when your Mom would say “If you don’t have anything nice to say, don’t say anything at all”? With a data breach notification letter, that saying doesn’t necessarily hold true. However, you can still be nice, while […]

Read full story Comments { 0 }

Things you should know before going live with a Complete Data Breach Response Strategy

This “Data Breach Response – How To” article is part of our larger series by Heather Noonan.  So you find yourself in the debacle of a data breach? Where in the world do you begin? Your management team is sending you emails left and right, meetings have started to run amok, and you haven’t had […]

Read full story Comments { 0 }