Latest Post

Loading...
Predictions for the data breach industry in 2018...

High-profile data breaches dominated the headlines in 2017, and unfortunately, these attacks are anticipated to only increase in frequency and magnitude in 2018. Breaches like those that affected LinkedIn, Dropbox and Yahoo, serve as a wake-up call for organizations to implement processes for safeguarding sensitive data and defending against...

Read More Predictions for the data breach industry in 2018
THIS IS ONLY A DRILL (FOR NOW): HOW TO CONDUCT A DATA ...

“Are we next?” That’s the question companies around the world are grappling with as more high-profile data breaches make headlines. At a time when one in four organizations experience cyber-attacks, mishandling the response can do more damage than the breach itself. We take precautions against dangerous situations every day....

Read More THIS IS ONLY A DRILL (FOR NOW): HOW TO CONDUCT A DATA BREACH RESPONSE DRILL
How to build a bulletproof internal data breach respon...

We recently released the latest edition of our Data Breach Response Guide, a resource we’re proud to offer to business leaders to help them navigate the often-nebulous waters of incident response planning. As the threat of data breaches become no longer a matter of “if” but “when,” it’s never...

Read More How to build a bulletproof internal data breach response team
Myth Buster: Most Consumers Aren’t at Risk for Identit...

Businesses may be increasingly aware of identity theft threats to their customers, but an Experian survey shows that many consumers still seriously underestimate their risk of falling victim to identity thieves. In fact, the persistent and harmful myth that the majority of consumers are not vulnerable to identity theft...

Read More Myth Buster: Most Consumers Aren’t at Risk for Identity Theft
Is Your Company Prepared to Deal with Dark Web Threats...

Everyone knows that the 90 percent of the iceberg below water, the part you can’t see, is the portion that can rip through the hull of a boat like damp paper. The dark web is the internet’s version of the submerged iceberg, and what happens there has the potential...

Read More Is Your Company Prepared to Deal with Dark Web Threats
TalkTalk fine’s message – regulators and consumers hol...

For the second time in less than a year, the United Kingdom’s data security regulator has fined one of the nation’s largest telecom companies for failing to protect customer data. The fine, and strongly worded comments from Information Commissioner Elizabeth Denham, should be a fresh wakeup call to all...

Read More TalkTalk fine’s message – regulators and consumers hold breached companies accountable
The Key Role of Cybersecurity When Strategizing Your C...

Companies around the world, of every size and in every industry, are engaging in digital transformation, as they seek to leverage technology to enhance efficiency, innovate products, automate processes and transform virtually every aspect of their operations. Some are doing so strategically, focusing on the big picture of how...

Read More The Key Role of Cybersecurity When Strategizing Your Company’s Digital Transformation
The Rise of Nation-State-Sponsored Ransomware and How ...

As if ransomware attacks weren’t diabolical enough, a new wrinkle may be emerging — hiding something even worse behind the ransomware assault. The recent Petya and WannaCry incidents, which affected hundreds of thousands of people plugged into networks in more than 150 countries, are examples of the latest trend...

Read More The Rise of Nation-State-Sponsored Ransomware and How Businesses Can Protect Themselves
Why companies should offer post-breach monitoring serv...

When a cybersecurity incident occurs, will your organization’s data breach response contribute to customer retention or undermine it? Multiple studies and surveys illustrate that how well a company supports consumers in the wake of a security event directly affects customers’ perceptions of and loyalty to the breached company. Consumers...

Read More Why companies should offer post-breach monitoring services
When thinking M&A, think cybersecurity...

When companies merge, acquire or are acquired, they’re exposed to a variety of threats during the transaction period, including ones that could potentially terminate the deal such as cybersecurity risks. Managing data breach and other cybersecurity risks must be a top priority for both acquired and acquiring companies to...

Read More When thinking M&A, think cybersecurity
Increasing leadership’s engagement in cybersecurity...

Does the c-suite give enough attention to cybersecurity? Multiple studies suggest many executives aren’t as engaged as they should be when ensuring their organizations are prepared to mitigate and manage cybersecurity risks, or respond when an incident does occur. Disengaged C-suites Nearly a quarter of risk managers polled by...

Read More Increasing leadership’s engagement in cybersecurity
Prediction check-in: Emerging threats present new chal...

New cyber risks emerge daily, and companies can find it challenging to maintain protections against known threats while also adjusting their response plans to account for new ones. While it’s virtually impossible to know exactly what cyber-criminals will think of next, it pays to be aware of new tools...

Read More Prediction check-in: Emerging threats present new challenges for companies