iOS app Android app

Data Breaches

How Will Business Navigate the New Security and Privacy Policy Landscape

Harlan Loeb | Posted 02.09.2017 | Business
Harlan Loeb

Leigh Nakanishi, lead of Edelman's Global Security & Privacy Group, has spent considerable time assessing what the Trump Presidency and a new administ...

5 Ways to Improve Security of Your Business before a Breach

Adeyemi Adetilewa | Posted 01.10.2017 | Business
Adeyemi Adetilewa

Cyber security has been an issue for so long. And it's getting difficult to remember a time when companies didn't have to worry about it. The number...

3 Things To Consider After The Latest Yahoo Breach

Adam Levin | Posted 12.23.2016 | Crime
Adam Levin

No payment card or banking information was compromised in the latest 1 billion-user breach at Yahoo, according to expert reports. But what if there had been? The truth is that for most users it would be annoying, but not the end of the world. So, why is this big news?

How to Make Sure Your Small Business Doesn't Have a Data Breach

John Rampton | Posted 11.23.2016 | Business
John Rampton

Security is arguably the top concern for customers. And, for good reason. In 2015 there was an estimated half a billion data breaches. A data breach ...

Work in Health Care? Watch Out For These Security Challenges!

Nadya Khoja | Posted 10.25.2016 | Business
Nadya Khoja

If you work in the healthcare industry, it is important to consider different security challenges that can risk your data and how to mitigate them. Fo...

7 Things To Do if Your Social Security Number Is Compromised

Adam Levin | Posted 09.30.2016 | Crime
Adam Levin

If you clicked here just to confirm that you have nothing to worry about, sorry - there's plenty to worry about.

The World is Looking to the US for Third Party Risk Guidance

Tom Garrubba | Posted 09.13.2016 | Business
Tom Garrubba

As more organizations here in North America and overseas increasingly utilize third party vendors with a global presence to perform critical functions, process key transactions and provide exposure to sensitive proprietary information, those organizations with mature third party risk (TPR) programs are receiving a loud call to provide assistance to those new to the TPR field.

The Digital Underworld: What You Need to Know

Doug Irving | Posted 07.26.2016 | Technology
Doug Irving

Illustration by Meriel Waissman Tens of millions of Americans will have their credit-card numbers, hospital records, or digital identities hacked or ...

BYOD in the Workplace: Benefits, Risks and Insurance Implications

Parker Beauchamp | Posted 07.13.2016 | Business
Parker Beauchamp

The global market for Bring Your Own Device (BYOD) is expected to reach $181.39 billion by 2017. BYOD policies can be a great way to increase worker s...

The True Cost of Online Crime

John Powers | Posted 05.27.2016 | Technology
John Powers

Photo Credit: User:Colin / Wikimedia Commons / CC-BY-SA-4.0 You can't believe everything you read on the Internet. That's a lesson I learned long bef...

You Can Prevent a 'Panama Papers' Scandal at Your Law Firm

Lou Shipley | Posted 05.03.2016 | Technology
Lou Shipley

Even if they aren't managing their own IT, law firms still have an obligation to make sure that data is properly secured. This means asking frequent questions about security and ensuring that the vendor is implementing reasonable security measures.

How Data Brokers Threaten Consumer Privacy

Michael Gregg | Posted 04.12.2016 | Technology
Michael Gregg

Let's face it, over the next few years, it's going to become increasingly difficult to protect your privacy online and in your day-to-day life. From...

Have You Been Google-Dorked? It's Possible.

Gene Marks | Posted 04.05.2016 | Business
Gene Marks

Google Dorking is a relatively easy way for someone to check if there are security holes in a network or individual computers.

Want to Lock Out ID Thieves? Do This!

Jeanne Kelly | Posted 03.21.2016 | Business
Jeanne Kelly

Do you lock the door behind you when you leave your house? Of course you do! Why? To keep anyone that's not supposed to be there from using your house...

The Cyber Security Conundrum

Alan W. Silberberg | Posted 03.09.2016 | Technology
Alan W. Silberberg

co·nun·drum kəˈnəndrəm/ noun noun: conundrum; plural noun: conundrums a confusing and difficult problem or question. "one of the most d...

Getting to "Reasonable" With the SAFETY Act

Brian E. Finch | Posted 02.24.2016 | Business
Brian E. Finch

While an executive or board member has every right to ask about a company's cybersecurity posture, the problem is that CIOs generally do not have the ...

Will anticipatory compliance be the next best practice?

Tom Garrubba | Posted 02.11.2017 | Business
Tom Garrubba

I was recently invited to speak on a panel regarding third party risk strategies for the Securities Industry and Financial Markets Association's (SIFM...

Why 2016 Will Be an Even Scarier Year for Internet Security

Rami Essaid | Posted 01.26.2017 | Technology
Rami Essaid

The holiday decorations had barely been returned to the attic when 2016 already saw its first high-profile cyber attack. Time Warner Cable said on Jan...

New Surveys on Privacy, Trust Portend Future Crisis

Harlan Loeb | Posted 01.21.2017 | Business
Harlan Loeb

Certainly, our form of government is supposed to ensure freedom against government and business abuses of privacy. Our personal data in the wrong hands can cause and does spark great harm. It damages that trust that is crucial in our relationships, both personal and professional.

The Simple Way to Keep Your Tax Refund Safe

Adam Levin | Posted 12.03.2016 | Crime
Adam Levin

The holiday season is just getting underway, a time dedicated to finding the perfect gift for loved ones and a steady procession of festive events that ends when we ring in the New Year. Unfortunately, it's also a busy time for people dedicated to the commission of identity-related tax fraud.

The Not-So-Secret Service: What Your Company Can Learn From the Rep. Chaffetz Scandal

Tom Garrubba | Posted 10.21.2016 | Business
Tom Garrubba

How can your company learn from the U.S. Secret Service's mistakes? Start by developing basic information security guidelines with respect to who can access sensitive data (such as personnel files or other confidential data) within your organization.

Hilton and Trump Hotel Breaches: What You Need to Know

NextAdvisor.com | Posted 10.07.2015 | Travel
NextAdvisor.com

By Jocelyn Baird, NextAdvisor.com If you thought credit card breaches were limited to restaurants and retail stores, you were unfortunately mistaken...

4.6 Million Customers Affected in Scottrade Breach: Are You One of Them?

NextAdvisor.com | Posted 10.06.2016 | Business
NextAdvisor.com

October is National Cyber Security Awareness Month, and it's off to a pretty dismal start. Following the Experian breach announcement on Oct. 2 that affected 15 million T-Mobile customers, retail brokerage Scottrade announced it had discovered a breach in one of its systems.

Experian Breach Exposes 15 Million T-Mobile Customers, Applicants' Information: What You Need to Know

NextAdvisor.com | Posted 10.06.2016 | Business
NextAdvisor.com

If you've applied for a T-Mobile phone plan within the past two years, there's a high chance your information may have been breached by Experian -- one of the three major credit bureaus.

Cyber Threats to Your Business: 4 Ways to Safeguard Your Assets

John Bowen | Posted 10.05.2016 | Business
John Bowen

Marc Goodman recently shared his top strategies for how entrepreneurs can thwart cyber criminals -- and prevent our most sensitive and important assets from getting hacked.