Facing Greater Risks, Small Businesses Still Lag in Adopting Cyber Insurance

Posted on Apr 19 2016 by

      What difference does $4.40 make? It can’t buy you much on its own, but it can make a world of difference when you’re handling the aftermath of a data breach or other cyberattack. That’s how much cyber insurance protection reduces the per-record cost of a data breach, according to the Ponemon Institute’s […]


How Can You Reduce Data Breach Costs?

Posted on Apr 05 2016 by

Bad news and good news emerged from the Ponemon Institute’s 2015 Cost of a Data Breach study, released in May: breach costs continue to rise, but security measures such as creating a data breach response team can significantly curb the costs of a data breach. The study found that the average total cost of a data […]


Video: 2016 Predictions – Mauricio Paez

Posted on Mar 31 2016 by

          Mauricio Paez, a partner with the international law firm Jones Day, recently joined me to share predictions about eight emerging and evolving trends in global cyberwarfare. Here are his insights: 1. Privacy and data breach litigation will continue to grow and evolve. In addition to more lawsuits related to privacy […]


Video: 2016 Predictions – Jon-Michael Brook

Posted on Mar 30 2016 by

          With 2016 an election year that’s already seen some evidence of campaign breach and hacking activity, how much more will we see the frequency and intesnsity potential increase before the polls close? Jon-Michael Brooke of Guide Holdings LLC joins me for a preview of the most significant potentials for the […]


Video: 2016 Predictions – Lynn Sessions

Posted on Mar 24 2016 by

      How do healthcare breaches continue to differ in their response to discovery and notification? Lynn Sessions of BakerHostetler shares how an increase in true security violations by external forces has triggered an increase in notifications on a serious scale in the healthcare space – you or those around you have probably noted […]


Why Are Employees the Weakest Link in Breach Prevention? Hear Answers at IAPP Global Privacy Summit

Posted on Mar 22 2016 by

      Employees are a company’s biggest asset, but when it comes to cyber security, they are often the weakest link. Unfortunately, a large number of security incidents are caused by employee negligence or the compromise of their computers or phones, leaving even companies with strong technical security programs at risk. Yet mitigating the […]


Video: 2016 Predictions – Bill Hardin

Posted on Mar 18 2016 by

          With the first quarter of 2016 wrapping up, it’s a good time to take a look at the cyber security trends that emerged at the end of 2015 and the beginning of 2016. What are the cyber risks companies will need to be most vigilant against for the rest of […]


What the EMV Liability Shift Means for Your Business

Posted on Mar 08 2016 by

As of last October, the EMV liability shift is a point of reality for consumers and businesses alike. Now, if your business is not yet chip-ready and card fraud occurs in a point-of-sale transaction in which a consumer uses a chip-enabled card, you — not the card-holder or issuer — could be liable for costs […]


Infographic: Timeline of a Data Breach Response

Posted on Feb 23 2016 by

      Preparing a breach response plan is sometimes a painful topic, planning the response that should happen after your business becomes the unfortunate victim of a cyber attack. How exactly should things work? Explore the timing of the planning and execution of a response – before and after the breach – as a […]


Involving Head Honchos in Data Breach Response

Posted on Feb 09 2016 by

Shouldn’t it be easy to convince your senior executives of the importance of cyber security? High-profile data breaches make the news, and your top decision-makers surely read the same headlines you do. Those reports — and numerous studies — make it clear that cyber security incidents continue to grow in volume, frequency and impact. Yet […]