iOS app Android app

Data Breach

How to Make Sure Your Small Business Doesn't Have a Data Breach

John Rampton | Posted 11.23.2016 | Business
John Rampton

Security is arguably the top concern for customers. And, for good reason. In 2015 there was an estimated half a billion data breaches. A data breach ...

Yahoo Says At Least 500 Million Accounts Hacked In 2014

Reuters | Annum Masroor | Posted 09.22.2016 | Technology

Yahoo Inc (YHOO.O) said on Thursday that information from at least 500 million of its user accounts was stolen in 2014 by what it believed was a state...

Data Breaches At U.S. Office Of Personnel Management Was Preventable, Investigation Finds

Reuters | Jade Walker | Posted 09.07.2016 | Politics

WASHINGTON (Reuters) - The U.S. Office of Personnel Management (OPM) did not follow rudimentary cyber security recommendations that could have mitigat...

The World is Looking to the US for Third Party Risk Guidance

Tom Garrubba | Posted 09.13.2016 | Business
Tom Garrubba

As more organizations here in North America and overseas increasingly utilize third party vendors with a global presence to perform critical functions, process key transactions and provide exposure to sensitive proprietary information, those organizations with mature third party risk (TPR) programs are receiving a loud call to provide assistance to those new to the TPR field.

Burning Down the House: Why is a Cyber Attack Different from a Fire Under the Law?

Daniel Garrie | Posted 06.09.2016 | Business
Daniel Garrie

This article was written by Daniel B. Garrie and Richard Borden. You are sitting at your desk and the fire alarm goes off. At first, you are annoyed...

Will anticipatory compliance be the next best practice?

Tom Garrubba | Posted 02.11.2017 | Business
Tom Garrubba

I was recently invited to speak on a panel regarding third party risk strategies for the Securities Industry and Financial Markets Association's (SIFM...

EMV Credit Card Chips: No Silver Bullet, but a Significant Step Forward in Fraud Reduction

ACM, the Association for Computing Machinery | Posted 01.05.2017 | Technology
ACM, the Association for Computing Machinery

By Steven Myers Associate Professor of Computer Science and Informatics Indiana University With the New Year beginning, we have just come through...

Uber Settles Investigation Into Creepy 'God View' Tracking Program

The Huffington Post | Kim Bellware | Posted 01.06.2016 | Technology

Uber has agreed to pay a $20,000 penalty and overhaul privacy and security practices to settle the New York attorney general's investigation into a se...

I Refuse to Strategically Vote for Hillary Clinton

Ben Spielberg | Posted 12.21.2016 | Politics
Ben Spielberg

While I understand the lesser-of-two-evils mentality, I disagree with it; most of Clinton's policy positions are unacceptable to me. If Sanders loses the primary, I will probably vote for Jill Stein.

DOJ Pursues Criminal Investigaton Of Data Breach At Uber

Reuters | Mehreen Kasana | Posted 01.16.2017 | Technology

SAN FRANCISCO, Dec 18 (Reuters) - The U.S. Department of Justice is pursuing a criminal investigation of a May 2014 data breach at ride service Uber, ...

After Hack, Congress Wants To Know How Vtech Collects Data On Kids

Reuters | Lorenzo Ligato | Posted 12.03.2015 | Technology

U.S. lawmakers on Wednesday asked VTech Holdings Ltd for details about the data it collects on children who use its digital toys, as well as how it pr...

VTech Hack Leaves Millions Of Parents -- And Their Kids -- Exposed

Reuters | Lorenzo Ligato | Posted 11.30.2015 | Technology

The theft of toy maker VTech Holdings Ltd's database highlights a growing problem with basic cyber security measures at small, non-financial companies...

The Not-So-Secret Service: What Your Company Can Learn From the Rep. Chaffetz Scandal

Tom Garrubba | Posted 10.21.2016 | Business
Tom Garrubba

How can your company learn from the U.S. Secret Service's mistakes? Start by developing basic information security guidelines with respect to who can access sensitive data (such as personnel files or other confidential data) within your organization.

Hilton and Trump Hotel Breaches: What You Need to Know | Posted 10.07.2015 | Travel

By Jocelyn Baird, If you thought credit card breaches were limited to restaurants and retail stores, you were unfortunately mistaken...

Inside The Hunt For The Uber Hacker

Reuters | Alexandra Ma | Posted 10.08.2015 | Technology

SAN FRANCISCO, Oct 8 (Reuters) - Eight months after disclosing a major data breach, ride service Uber is focusing its legal efforts on learning more a...

4.6 Million Customers Affected in Scottrade Breach: Are You One of Them? | Posted 10.06.2016 | Business

October is National Cyber Security Awareness Month, and it's off to a pretty dismal start. Following the Experian breach announcement on Oct. 2 that affected 15 million T-Mobile customers, retail brokerage Scottrade announced it had discovered a breach in one of its systems.

Experian Breach Exposes 15 Million T-Mobile Customers, Applicants' Information: What You Need to Know | Posted 10.06.2016 | Business

If you've applied for a T-Mobile phone plan within the past two years, there's a high chance your information may have been breached by Experian -- one of the three major credit bureaus.

Former DHS Director Chertoff: 'You Can't Have Privacy Without Security'

The Huffington Post | Alexander Howard | Posted 10.03.2015 | Technology

If you can’t lock your door, you can’t maintain the privacy of your home. If you can’t encrypt your phone, you can’t keep your personal data p...

Don't Collect What You Can't Protect

Christopher Burgess | Posted 09.25.2016 | Technology
Christopher Burgess

The mantra of every corporation should be, "Don't collect what you can't protect." It should matter not if you are the CEO of very large corporati...

Comcast To Pay $33 Million Over Privacy Breach

AP | Alexandra Ma | Posted 01.03.2017 | Technology

LOS ANGELES (AP) -- Cable operator Comcast has settled with California authorities and agreed to pay $33 million for accidentally publishing the names...

The Medical Identity Theft Apocalypse? Fear the Walking Files

Adam Levin | Posted 09.17.2016 | Technology
Adam Levin

Criminal cyber attacks on health care information repositories have increased 125 percent since 2010. With the announcement of the Excellus breach last week, the total number of big-headline medical information compromises reported in 2015 had crossed the mind-blowing demarcation line of 100 million files.

How's Your Data Security? The FTC Now Wants to Know

Gene Marks | Posted 09.02.2016 | Business
Gene Marks

Are you taking "reasonable steps to secure sensitive consumer information"? I certainly hope so. If not, the U.S. government can now come after you.

The Ashley Madison Hack: A Privacy Issue, Not an Adultery Issue

Patrick Ambron | Posted 08.21.2016 | Technology
Patrick Ambron

While on the surface this may seem like a deserved day of reckoning for exposed adulterers, it speaks to a much larger privacy issue that concerns everyone. We live our entire lives online, and our actions there hinge on the promise of privacy.

Top Official Resigns Amid News Of Major Data Breach

Reuters | Posted 07.10.2015 | Politics

WASHINGTON, July 10 (Reuters) - The chief of the U.S. Office of Personnel Management, Katherine Archuleta, is resigning in the aftermath of computer h...

Hackers Stole Social Security Numbers From 21.5 Million People In Recent Data Breach, U.S. Says

Reuters | Posted 07.10.2015 | Politics

WASHINGTON, July 9 (Reuters) - Data breaches at the U.S. government's personnel management agency by hackers, with suspicions centering on China, invo...