Breach Prevention

Loading...
How hackers find their targets...

The rash of large-scale data breaches in the news this year begs many questions, one of which is this: how do hackers select their victims?...

Read More How hackers find their targets
Lost memory: How memory sticks can lead to data breach...

A recent survey by the Ponemon Institute uncovered some scary facts about how vulnerable companies are to the threats posed by thumb...

Read More Lost memory: How memory sticks can lead to data breaches
Do your passwords pass the hack test?...

The steady drumbeat of recent data breaches has called significant attention to the security vulnerabilities of even the world’s biggest corporate brands and defense organizations. These incidents have spotlighted the need for improved breach prevention m...

Read More Do your passwords pass the hack test?
Child identity theft: A new frontier for fraudsters...

A recent Federal Trade Commission discussion, "Stolen Futures: A Forum on Child Identity Theft,” presented a valuable opportunity to galvanize industry experts and public leaders around this increasing privacy t...

Read More Child identity theft: A new frontier for fraudsters
Security vs. Commerce: Striking a balance...

At the recent data security and privacy hearing held by the Senate Commerce, Science and Transportation Committee, there appeared to be widespread agreement that national data breach laws are...

Read More Security vs. Commerce: Striking a balance
As organized crime goes virtual, the law cyber-saddles...

Cyber criminals have been so successful in recent years that they have seemed unstoppable, leaving federal law enforcement struggling with the fast pace of attacks and ever-changing...

Read More As organized crime goes virtual, the law cyber-saddles up
Encryption: Data’s best friend...

When considering your company’s full breach prevention strategy, consider encryption a strong bodyguard that can play a big role in protecting data while also shielding your company from embarrassing and costly b...

Read More Encryption: Data’s best friend
Tips to implement an effective social media policy...

A well-crafted social media policy with clear guidelines addressing these and other risks can substantially reduce the number of data breach incidents related to social media use....

Read More Tips to implement an effective social media policy
Scam report: Insider fraud...

According to a Report to the Nations on Occupational Fraud and Abuse, in 2009, the average company lost nearly 5% of its revenue to fraud perpetrated by...

Read More Scam report: Insider fraud
Cyber liability insurance: 5 fast facts...

In this daunting time of high-wire cyber attacks, when even the most trusted brands are falling prey to tireless hackers, there’s no such thing as being too prepared....

Read More Cyber liability insurance: 5 fast facts
Law vs. Technology: Which stops more breaches?...

With the recent rash of highly newsworthy data breaches, headlined by the Sony PlayStation Network breach that impacted 77+ million subscribers, there’s been much hand-wringing over how to best ensure the protection of customer p...

Read More Law vs. Technology: Which stops more breaches?
The high cost of data breaches just got higher...

In an effort to make data breaches even more unpalatable and motivate companies to strengthen their security practices, the Federal Trade Commission is beginning to levy punishments for security holes that invite intrusions....

Read More The high cost of data breaches just got higher