Archive | Incident Response RSS feed for this section

New Survey: Customers Come First in Breach Response

According to a new study from ID Experts, the customer should always come first when it comes to breach response. By not focusing on the customer, there’s far more to lose than just money- your reputation is on the line. To date, more than 34 million records have been breached in 2016, according to the […]

Read full story Comments { 0 }

Data Breach 2016: 529 Million Records and Counting!

In 2016 alone, 529 million records have been breached in one of the worst, most frightening years for cyber security. Between DDoS, malware, phishing, ransomware, oh my, it’s no wonder. And we thought 2015 was a doozy for data breaches! The case could be made that 2016 has already been the most frightening year yet […]

Read full story Comments { 0 }

DDoS and the Internet of Things

The Internet of Things (IoT) is here to stay, but are we fully prepared for the privacy and security implications that come with it? As it turns out, IoT played a part in last month’s DDoS attacks against Spotify, Netflix, Airbnb and Twitter, to name a few. The recent DDoS attacks demonstrated that the real […]

Read full story Comments { 0 }

Global Cost of Cyber Crime to Hit $6 Trillion in 2016

The global cost of cyber crime, according to a recent study by Cybersecurity Ventures and the Ponemon Institute, could reach $6 trillion before the end of 2016. While $6 trillion may seem a little high, more than a trillion isn’t unlikely either. A report out by Cybersecurity Ventures predicts global annual cybercrime costs will grow […]

Read full story Comments { 0 }

Top Concern: The Prospect of a Big Data Breach, New Report Shows

According to a new survey by Advisen, that was commissioned by ID Experts, a majority of organizations are really concerned at the prospect of a big data breach. With the ever evolving cybersecurity landscape and advancing cyber criminal attacks, data breaches should be #1 on every company’s radar. This enlightening survey highlights several key findings, […]

Read full story Comments { 0 }

Incident Response Management, Revolutionized

What does every company need to meet privacy obligations? A solution that automates incident response management, improves efficiency, and: Addresses complex obligations of a covered entity, business associate, or third-party administrator Provides incident risk assessment and guidance based on the latest state and federal laws for consistent decision making Identifies and analyzes incident trends and […]

Read full story Comments { 0 }

Navigating the Rough Waters of a Being a HIPAA Business Associate

One the most frequently asked question of organizations in the healthcare universe (anyone who manages PHI) is “Am I a HIPAA Business Associate?”  The second most frequent question, “what is a HIPAA Business Associate?” Are We a Business Associate? Chances are, you are a business associate. In all likelihood, when you set up your business […]

Read full story Comments { 0 }

Malicious Attacks now Leading Cause of Healthcare Data Breaches

A new study by the Ponemon Institute and ID Experts reveals a trend that has the Healthcare industry on edge. For the first year in it’s five years of reporting, malicious criminal attacks now lead the pack for healthcare data breach causes – previously, unintentional events/accidents were the leading cause of healthcare breaches. This comes […]

Read full story Comments { 0 }

Software for Privacy & Security Incident Response

More and more organization are turning to software platforms to address the increasing burden privacy and security incidents create for companies that hold or process regulated data – data regulated by federal laws (HIPAA/HITECH) or regulated by numerous and varying state data breach laws. “Organizations are increasingly turning to RADAR®, patented privacy & security incident […]

Read full story Comments { 0 }

Updated Breach Response Plan for 2015

Have you updated your data breach response plans for 2015? When your organization suspects a data privacy or security incident has occurred, you must act quickly to initiate and manage your response. The process tends to be complex, stressful and “high stakes” given that your customers or patients are affected and your reputation is at […]

Read full story Comments { 0 }