Preparedness, planning, and strategies for execution
To cloud or not to cloud? That is the question. And while there’s no questioning the convenience and benefits of cloud storage – you...
How important is cyber security? October is National Cyber Security Awareness Month for the ninth consecutive year and each year, the designation seems to...
Join us for an interactive discussion on key data breach mistakes and how to overcome them on October 11 at the IAPP Privacy Academy...
Health care fraud and abuse has been in the national spotlight for years. But now that the Affordable Care Act is coming into play,...
Many small business owners believe that their companies are too small to be victims of data breach. When in reality, nothing could be further...
Our guest blogger this week is Zachary Smith, a legislative analyst for the Experian Government Affairs team. Despite being a top priority for the...
Today, those who steal data from the outside also usually steal the headlines. Witness recent mega-hacks at some very well-known firms: Electronics corporation: criminals...
Swimmers may be stealing the spotlight, but it’s scammers who are taking home the gold–in the form of stolen credit card numbers, PINs, consumers’...
Phishing attacks, despite their long history, continue to be one of the greatest threats to data security. More than 200,000 new viruses are discovered...
As mobile banking grows in popularity, so do the dangers of data breach and identity theft. In fact, these data security dangers are so...
Can you imagine losing backup disks containing information for 300,000 patients? Or having computer back-up tapes stolen? What if someone hacked into your network...
Like Blanche Dubois in A Streetcar Named Desire, we’d all like to think that we can depend upon the kindness of strangers. Unfortunately, Symantec...