iOS app Android app

Data Breaches

The Not-So-Secret Service: What Your Company Can Learn From the Rep. Chaffetz Scandal

Tom Garrubba | Posted 10.21.2015 | Business
Tom Garrubba

How can your company learn from the U.S. Secret Service's mistakes? Start by developing basic information security guidelines with respect to who can access sensitive data (such as personnel files or other confidential data) within your organization.

Hilton and Trump Hotel Breaches: What You Need to Know | Posted 10.07.2015 | Travel

By Jocelyn Baird, If you thought credit card breaches were limited to restaurants and retail stores, you were unfortunately mistaken...

4.6 Million Customers Affected in Scottrade Breach: Are You One of Them? | Posted 10.06.2015 | Business

October is National Cyber Security Awareness Month, and it's off to a pretty dismal start. Following the Experian breach announcement on Oct. 2 that affected 15 million T-Mobile customers, retail brokerage Scottrade announced it had discovered a breach in one of its systems.

Experian Breach Exposes 15 Million T-Mobile Customers, Applicants' Information: What You Need to Know | Posted 10.07.2015 | Business

If you've applied for a T-Mobile phone plan within the past two years, there's a high chance your information may have been breached by Experian -- one of the three major credit bureaus.

Cyber Threats to Your Business: 4 Ways to Safeguard Your Assets

John Bowen | Posted 10.05.2015 | Business
John Bowen

Marc Goodman recently shared his top strategies for how entrepreneurs can thwart cyber criminals -- and prevent our most sensitive and important assets from getting hacked.

From Strip to Chip: Everything You Need to Know About the New Generation of Payment Cards

Nathaniel Sillin | Posted 09.30.2015 | Business
Nathaniel Sillin

If you travel overseas regularly, you've probably already seen chip card technology in action. It's based on a global standard called EMV and is already at work in countries moving to cashless options for private and public goods and services.

How to Keep Scammers From Pulling an Identity Theft Double Whammy

Adam Levin | Posted 09.24.2015 | Crime
Adam Levin

When it comes to data security and the real-life impact of identity theft, public awareness is at an all-time high. But there is still great confusion and ignorance about what it is, how it happens, and what can be done to avoid the pitfalls of life after a data breach or personal compromise.

Don't Let Your SMB Get Caught With Its Pants Down

Jason Glassberg | Posted 09.18.2015 | Technology
Jason Glassberg

The hack of has been a wakeup call to many Americans that there's no such thing as a "safe" secret on the web -- but it should also be a wake-up call to another important group: the 28 million small businesses scattered across the U.S.

How the Ashley Madison Hack Might Impact You | Posted 08.28.2015 | Technology

Whether you are a part of the database or not, this hack could affect you. Millions of e-mail addresses, home addresses, credit cards and other information are contained within the leaked database.

The Most Dangerous Identity Theft Threat

Adam Levin | Posted 08.06.2015 | Technology
Adam Levin

Last weekend, TheUpshot published the most dangerous identity theft threat: the non-expert's tendency to underestimate the magnitude of problem.

Back-to-School Cybersecurity - Seven Things Every College Student Should Do

Jason Glassberg | Posted 08.05.2015 | Technology
Jason Glassberg

Millions of Americans will soon be headed back to college campuses for the new school year, but one thing they'll need to watch out for is a growing risk of getting hacked.

Are Elite Credit Cards Most Vulnerable to Hackers?

CompareCards | Posted 07.29.2015 | Money

The crooks always seem to be one step ahead of the security features and many cardholders are now wondering if there is anything they can do to take the target off their backs. Here are a few tips to consider that might help you fly under the radar of today's cyber criminals.

Why You Need to Add Third Parties Into Your Business Resiliency Equation

Tom Garrubba | Posted 07.09.2015 | Business
Tom Garrubba

You'll never know where the next "hit" is going to come from, but if or when it does, the efforts brought into it should certainly pay off.

8 Things You Should Know About the Office of Personnel Management Breach

Michael Gregg | Posted 06.26.2015 | Technology
Michael Gregg

For almost a month, the Office of Personnel Management (OPM) has been engaged in damage control after publicly disclosing that it was the victim of a massive data breach of government employee data.

The Real Question We Should Be Asking After the Massive Government Hack

Adam Levin | Posted 06.11.2015 | Technology
Adam Levin

True or False? There was no way the Office of Personnel Management could have prevented hackers from stealing the sensitive personal information of 4.1 million federal employees, past and present. If you guessed "False," you'd be wrong. If you guessed, "True," you'd also be wrong.

What You May be Doing Everyday to Reveal Your Identity and Good Credit

Jeanne Kelly | Posted 06.10.2015 | Business
Jeanne Kelly

Next time you plan to have a sensitive or private conversation, take a moment to make that call in a private location. Remember also that neither emails nor text messages are secure forms of communication for your private information as well.

The Recent IRS Breach and How We Can Act to Secure Personal Data

Rep. Jan Schakowsky | Posted 05.29.2015 | Politics
Rep. Jan Schakowsky

Over the past decade, almost one billion records with personal information have been compromised -- things like Social Security numbers, birth dates, address and even tax filing status. In many cases, those breaches were not highly sophisticated.

What Everyone Needs to Know About the IRS Breach

TJ Trent | Posted 05.28.2015 | Technology
TJ Trent

As a cyber security professional balancing the unique needs of the organization with industry best business practices is always a challenge. Tactics, techniques, and procedures are often a reflection of an organization's prevailing mindset.

5 Identity Theft Facts That Will Terrify You

Adam Levin | Posted 05.21.2015 | Crime
Adam Levin

Identity theft was the number one consumer complaint at the Federal Trade Commission last year. So far in 2015, the data breach problem that drives so many identity-related crimes has gotten worse. The massive compromises at Anthem and Premera alone put a combined 91 million records in harm's way.

Password Breaches: Why Legislation is the Way Forward

Joe Ross | Posted 06.22.2015 | Technology
Joe Ross

While there are no laws forcing businesses to notify customers of a password breach yet, there is an ethical responsibility that exists for companies to notify their customers in a timely manner when a breach occurs.

This Sums Up The Utter Failure Of Cybersecurity

The Huffington Post | Alexander C. Kaufman | Posted 04.21.2015 | Business

"The security industry is sort of like the Band-Aid industry."

Should We Kill the Social Security Number?

Adam Levin | Posted 06.16.2015 | Technology
Adam Levin

The Anthem breach alone exposed 80 million Social Security numbers, and then was quickly followed by the Premera breach that exposed yet another 11 million Americans' SSNs. The question now: Why are we still using Social Security numbers to identify taxpayers?

Your Privacy -- Qualcomm, Suicide, DARPA: Top Trending Stories Today

Mark Weinstein | Posted 05.20.2015 | Technology
Mark Weinstein

As we move forward into March Madness, we look back at the hottest trending online privacy stories and discover a different form of madness. Some of the news is good, some is bad and some sends a message of hope for our future.

Do You Know Where Your Health Data Is?

Ifeoma Ajunwa | Posted 04.15.2015 | Impact
Ifeoma Ajunwa

The data we generate in our digital lives can reveal important information, particularly about our health. For one, our social networks can be predictive of health outcomes and conditions, in part because of shared attitudes amongst social groups.

Are You Your Own Worst Enemy When It Comes to Identity Theft?

Adam Levin | Posted 04.14.2015 | Technology
Adam Levin

In each of these instances, we leave ourselves vulnerable to those who consider the theft of our identity as their day job. We are also contributing our personal data to folks who are hoping to someday launch the equivalent of a denial of service attack on our economy to take us down.