iOS app Android app

Data Breaches

Will anticipatory compliance be the next best practice?

Tom Garrubba | Posted 02.12.2016 | Business
Tom Garrubba

I was recently invited to speak on a panel regarding third party risk strategies for the Securities Industry and Financial Markets Association's (SIFM...

5 Things People Should Stop Storing in their Smartphone

Genia Stevens, MBA | Posted 02.08.2016 | Technology
Genia Stevens, MBA

According to Marc Rogers, Principal Security Researcher at Lookout, your smartphone is 30 times more valuable per ounce than a block of solid silver. ...

Why 2016 Will Be an Even Scarier Year for Internet Security

Rami Essaid | Posted 01.27.2016 | Technology
Rami Essaid

The holiday decorations had barely been returned to the attic when 2016 already saw its first high-profile cyber attack. Time Warner Cable said on Jan...

New Surveys on Privacy, Trust Portend Future Crisis

Harlan Loeb | Posted 01.21.2016 | Business
Harlan Loeb

Certainly, our form of government is supposed to ensure freedom against government and business abuses of privacy. Our personal data in the wrong hands can cause and does spark great harm. It damages that trust that is crucial in our relationships, both personal and professional.

The Simple Way to Keep Your Tax Refund Safe

Adam Levin | Posted 12.03.2015 | Crime
Adam Levin

The holiday season is just getting underway, a time dedicated to finding the perfect gift for loved ones and a steady procession of festive events that ends when we ring in the New Year. Unfortunately, it's also a busy time for people dedicated to the commission of identity-related tax fraud.

The Not-So-Secret Service: What Your Company Can Learn From the Rep. Chaffetz Scandal

Tom Garrubba | Posted 10.21.2015 | Business
Tom Garrubba

How can your company learn from the U.S. Secret Service's mistakes? Start by developing basic information security guidelines with respect to who can access sensitive data (such as personnel files or other confidential data) within your organization.

Hilton and Trump Hotel Breaches: What You Need to Know

NextAdvisor.com | Posted 10.07.2015 | Travel
NextAdvisor.com

By Jocelyn Baird, NextAdvisor.com If you thought credit card breaches were limited to restaurants and retail stores, you were unfortunately mistaken...

4.6 Million Customers Affected in Scottrade Breach: Are You One of Them?

NextAdvisor.com | Posted 10.06.2015 | Business
NextAdvisor.com

October is National Cyber Security Awareness Month, and it's off to a pretty dismal start. Following the Experian breach announcement on Oct. 2 that affected 15 million T-Mobile customers, retail brokerage Scottrade announced it had discovered a breach in one of its systems.

Experian Breach Exposes 15 Million T-Mobile Customers, Applicants' Information: What You Need to Know

NextAdvisor.com | Posted 10.07.2015 | Business
NextAdvisor.com

If you've applied for a T-Mobile phone plan within the past two years, there's a high chance your information may have been breached by Experian -- one of the three major credit bureaus.

Cyber Threats to Your Business: 4 Ways to Safeguard Your Assets

John Bowen | Posted 10.05.2015 | Business
John Bowen

Marc Goodman recently shared his top strategies for how entrepreneurs can thwart cyber criminals -- and prevent our most sensitive and important assets from getting hacked.

From Strip to Chip: Everything You Need to Know About the New Generation of Payment Cards

Nathaniel Sillin | Posted 09.30.2015 | Business
Nathaniel Sillin

If you travel overseas regularly, you've probably already seen chip card technology in action. It's based on a global standard called EMV and is already at work in countries moving to cashless options for private and public goods and services.

How to Keep Scammers From Pulling an Identity Theft Double Whammy

Adam Levin | Posted 09.24.2015 | Crime
Adam Levin

When it comes to data security and the real-life impact of identity theft, public awareness is at an all-time high. But there is still great confusion and ignorance about what it is, how it happens, and what can be done to avoid the pitfalls of life after a data breach or personal compromise.

Don't Let Your SMB Get Caught With Its Pants Down

Jason Glassberg | Posted 09.18.2015 | Technology
Jason Glassberg

The hack of AshleyMadison.com has been a wakeup call to many Americans that there's no such thing as a "safe" secret on the web -- but it should also be a wake-up call to another important group: the 28 million small businesses scattered across the U.S.

How the Ashley Madison Hack Might Impact You

NextAdvisor.com | Posted 08.28.2015 | Technology
NextAdvisor.com

Whether you are a part of the database or not, this hack could affect you. Millions of e-mail addresses, home addresses, credit cards and other information are contained within the leaked database.

The Most Dangerous Identity Theft Threat

Adam Levin | Posted 08.06.2015 | Technology
Adam Levin

Last weekend, TheUpshot published the most dangerous identity theft threat: the non-expert's tendency to underestimate the magnitude of problem.

Back-to-School Cybersecurity - Seven Things Every College Student Should Do

Jason Glassberg | Posted 08.05.2015 | Technology
Jason Glassberg

Millions of Americans will soon be headed back to college campuses for the new school year, but one thing they'll need to watch out for is a growing risk of getting hacked.

Are Elite Credit Cards Most Vulnerable to Hackers?

CompareCards | Posted 07.29.2015 | Money
CompareCards

The crooks always seem to be one step ahead of the security features and many cardholders are now wondering if there is anything they can do to take the target off their backs. Here are a few tips to consider that might help you fly under the radar of today's cyber criminals.

Why You Need to Add Third Parties Into Your Business Resiliency Equation

Tom Garrubba | Posted 07.09.2015 | Business
Tom Garrubba

You'll never know where the next "hit" is going to come from, but if or when it does, the efforts brought into it should certainly pay off.

8 Things You Should Know About the Office of Personnel Management Breach

Michael Gregg | Posted 06.26.2015 | Technology
Michael Gregg

For almost a month, the Office of Personnel Management (OPM) has been engaged in damage control after publicly disclosing that it was the victim of a massive data breach of government employee data.

The Real Question We Should Be Asking After the Massive Government Hack

Adam Levin | Posted 06.11.2015 | Technology
Adam Levin

True or False? There was no way the Office of Personnel Management could have prevented hackers from stealing the sensitive personal information of 4.1 million federal employees, past and present. If you guessed "False," you'd be wrong. If you guessed, "True," you'd also be wrong.

What You May be Doing Everyday to Reveal Your Identity and Good Credit

Jeanne Kelly | Posted 06.10.2015 | Business
Jeanne Kelly

Next time you plan to have a sensitive or private conversation, take a moment to make that call in a private location. Remember also that neither emails nor text messages are secure forms of communication for your private information as well.

The Recent IRS Breach and How We Can Act to Secure Personal Data

Rep. Jan Schakowsky | Posted 05.29.2015 | Politics
Rep. Jan Schakowsky

Over the past decade, almost one billion records with personal information have been compromised -- things like Social Security numbers, birth dates, address and even tax filing status. In many cases, those breaches were not highly sophisticated.

What Everyone Needs to Know About the IRS Breach

TJ Trent | Posted 05.28.2015 | Technology
TJ Trent

As a cyber security professional balancing the unique needs of the organization with industry best business practices is always a challenge. Tactics, techniques, and procedures are often a reflection of an organization's prevailing mindset.

5 Identity Theft Facts That Will Terrify You

Adam Levin | Posted 05.21.2015 | Crime
Adam Levin

Identity theft was the number one consumer complaint at the Federal Trade Commission last year. So far in 2015, the data breach problem that drives so many identity-related crimes has gotten worse. The massive compromises at Anthem and Premera alone put a combined 91 million records in harm's way.

Password Breaches: Why Legislation is the Way Forward

Joe Ross | Posted 06.22.2015 | Technology
Joe Ross

While there are no laws forcing businesses to notify customers of a password breach yet, there is an ethical responsibility that exists for companies to notify their customers in a timely manner when a breach occurs.