iOS app Android app

Data Breaches

BYOD in the Workplace: Benefits, Risks and Insurance Implications

Parker Beauchamp | Posted 07.13.2016 | Business
Parker Beauchamp

The global market for Bring Your Own Device (BYOD) is expected to reach $181.39 billion by 2017. BYOD policies can be a great way to increase worker s...

The True Cost of Online Crime

John Powers | Posted 05.27.2016 | Technology
John Powers

Photo Credit: User:Colin / Wikimedia Commons / CC-BY-SA-4.0 You can't believe everything you read on the Internet. That's a lesson I learned long bef...

You Can Prevent a 'Panama Papers' Scandal at Your Law Firm

Lou Shipley | Posted 05.03.2016 | Technology
Lou Shipley

Even if they aren't managing their own IT, law firms still have an obligation to make sure that data is properly secured. This means asking frequent questions about security and ensuring that the vendor is implementing reasonable security measures.

How Data Brokers Threaten Consumer Privacy

Michael Gregg | Posted 04.12.2016 | Technology
Michael Gregg

Let's face it, over the next few years, it's going to become increasingly difficult to protect your privacy online and in your day-to-day life. From...

Have You Been Google-Dorked? It's Possible.

Gene Marks | Posted 04.05.2016 | Business
Gene Marks

Google Dorking is a relatively easy way for someone to check if there are security holes in a network or individual computers.

Want to Lock Out ID Thieves? Do This!

Jeanne Kelly | Posted 03.21.2016 | Business
Jeanne Kelly

Do you lock the door behind you when you leave your house? Of course you do! Why? To keep anyone that's not supposed to be there from using your house...

The Cyber Security Conundrum

Alan W. Silberberg | Posted 03.09.2016 | Technology
Alan W. Silberberg

co·nun·drum kəˈnəndrəm/ noun noun: conundrum; plural noun: conundrums a confusing and difficult problem or question. "one of the most d...

Getting to "Reasonable" With the SAFETY Act

Brian E. Finch | Posted 02.24.2016 | Business
Brian E. Finch

While an executive or board member has every right to ask about a company's cybersecurity posture, the problem is that CIOs generally do not have the ...

Will anticipatory compliance be the next best practice?

Tom Garrubba | Posted 02.12.2016 | Business
Tom Garrubba

I was recently invited to speak on a panel regarding third party risk strategies for the Securities Industry and Financial Markets Association's (SIFM...

Why 2016 Will Be an Even Scarier Year for Internet Security

Rami Essaid | Posted 01.27.2016 | Technology
Rami Essaid

The holiday decorations had barely been returned to the attic when 2016 already saw its first high-profile cyber attack. Time Warner Cable said on Jan...

New Surveys on Privacy, Trust Portend Future Crisis

Harlan Loeb | Posted 01.21.2016 | Business
Harlan Loeb

Certainly, our form of government is supposed to ensure freedom against government and business abuses of privacy. Our personal data in the wrong hands can cause and does spark great harm. It damages that trust that is crucial in our relationships, both personal and professional.

The Simple Way to Keep Your Tax Refund Safe

Adam Levin | Posted 12.03.2015 | Crime
Adam Levin

The holiday season is just getting underway, a time dedicated to finding the perfect gift for loved ones and a steady procession of festive events that ends when we ring in the New Year. Unfortunately, it's also a busy time for people dedicated to the commission of identity-related tax fraud.

The Not-So-Secret Service: What Your Company Can Learn From the Rep. Chaffetz Scandal

Tom Garrubba | Posted 10.21.2015 | Business
Tom Garrubba

How can your company learn from the U.S. Secret Service's mistakes? Start by developing basic information security guidelines with respect to who can access sensitive data (such as personnel files or other confidential data) within your organization.

Hilton and Trump Hotel Breaches: What You Need to Know

NextAdvisor.com | Posted 10.07.2015 | Travel
NextAdvisor.com

By Jocelyn Baird, NextAdvisor.com If you thought credit card breaches were limited to restaurants and retail stores, you were unfortunately mistaken...

4.6 Million Customers Affected in Scottrade Breach: Are You One of Them?

NextAdvisor.com | Posted 10.06.2015 | Business
NextAdvisor.com

October is National Cyber Security Awareness Month, and it's off to a pretty dismal start. Following the Experian breach announcement on Oct. 2 that affected 15 million T-Mobile customers, retail brokerage Scottrade announced it had discovered a breach in one of its systems.

Experian Breach Exposes 15 Million T-Mobile Customers, Applicants' Information: What You Need to Know

NextAdvisor.com | Posted 10.07.2015 | Business
NextAdvisor.com

If you've applied for a T-Mobile phone plan within the past two years, there's a high chance your information may have been breached by Experian -- one of the three major credit bureaus.

Cyber Threats to Your Business: 4 Ways to Safeguard Your Assets

John Bowen | Posted 10.05.2015 | Business
John Bowen

Marc Goodman recently shared his top strategies for how entrepreneurs can thwart cyber criminals -- and prevent our most sensitive and important assets from getting hacked.

From Strip to Chip: Everything You Need to Know About the New Generation of Payment Cards

Nathaniel Sillin | Posted 09.30.2015 | Business
Nathaniel Sillin

If you travel overseas regularly, you've probably already seen chip card technology in action. It's based on a global standard called EMV and is already at work in countries moving to cashless options for private and public goods and services.

How to Keep Scammers From Pulling an Identity Theft Double Whammy

Adam Levin | Posted 09.24.2015 | Crime
Adam Levin

When it comes to data security and the real-life impact of identity theft, public awareness is at an all-time high. But there is still great confusion and ignorance about what it is, how it happens, and what can be done to avoid the pitfalls of life after a data breach or personal compromise.

Don't Let Your SMB Get Caught With Its Pants Down

Jason Glassberg | Posted 09.18.2015 | Technology
Jason Glassberg

The hack of AshleyMadison.com has been a wakeup call to many Americans that there's no such thing as a "safe" secret on the web -- but it should also be a wake-up call to another important group: the 28 million small businesses scattered across the U.S.

How the Ashley Madison Hack Might Impact You

NextAdvisor.com | Posted 08.28.2015 | Technology
NextAdvisor.com

Whether you are a part of the database or not, this hack could affect you. Millions of e-mail addresses, home addresses, credit cards and other information are contained within the leaked database.

The Most Dangerous Identity Theft Threat

Adam Levin | Posted 08.06.2015 | Technology
Adam Levin

Last weekend, TheUpshot published the most dangerous identity theft threat: the non-expert's tendency to underestimate the magnitude of problem.

Back-to-School Cybersecurity - Seven Things Every College Student Should Do

Jason Glassberg | Posted 08.05.2015 | Technology
Jason Glassberg

Millions of Americans will soon be headed back to college campuses for the new school year, but one thing they'll need to watch out for is a growing risk of getting hacked.

Are Elite Credit Cards Most Vulnerable to Hackers?

CompareCards | Posted 07.29.2015 | Money
CompareCards

The crooks always seem to be one step ahead of the security features and many cardholders are now wondering if there is anything they can do to take the target off their backs. Here are a few tips to consider that might help you fly under the radar of today's cyber criminals.

Why You Need to Add Third Parties Into Your Business Resiliency Equation

Tom Garrubba | Posted 07.09.2016 | Business
Tom Garrubba

You'll never know where the next "hit" is going to come from, but if or when it does, the efforts brought into it should certainly pay off.