Breach Prevention

Preparedness, planning, and strategies for execution

Loading...

Are you updating your data breach response plan to respond to new threats and forensic analysis? Discover how often updates may be...

June 28, 2016 by ofonseca

What keeps your cyber security team up at night, and does it weigh equally on the minds of managers? Do they lose sleep worrying...

June 1, 2016 by Michael Bruemmer

What difference does $4.40 make? It can’t buy you much on its own, but it can make a world of difference when you’re handling...

April 19, 2016 by ofonseca

Bad news and good news emerged from the Ponemon Institute’s 2015 Cost of a Data Breach study, released in May: breach costs continue to...

April 5, 2016 by ofonseca

Mauricio Paez, a partner with the international law firm Jones Day, recently joined me to share predictions about eight emerging and evolving trends in...

March 31, 2016 by Michael Bruemmer

With 2016 an election year that's already seen some evidence of campaign breaches, how much more will we see the frequency and intensity potential...

March 30, 2016 by Michael Bruemmer

How do healthcare breaches continue to differ in their response to discovery and notification? Lynn Sessions of BakerHostetler shares how an increase in true...

March 24, 2016 by Michael Bruemmer

As of last October, the EMV liability shift is a point of reality for consumers and businesses alike. Now, if your business is not...

March 8, 2016 by ofonseca

There have been no shortage of changes in the medical world in the last few years, many triggered by the arrival of the Affordable...

January 27, 2016 by Michael Bruemmer

Employees: A Data Breach’s Hidden Victims Headline-grabbing data breaches have raised awareness of the devastating impact data loss can have on the affected consumers...

January 12, 2016 by mmorelli

Your employees are your greatest asset, but they may also pose the greatest data breach risk to your organization. Unfortunately, multiple studies and research point...

July 14, 2015 by ofonseca

Who are behind cybercrimes? When it comes to these thieves behind computers, not all perpetrators are the same, and how they ply their attacks...

June 30, 2015 by Michael Bruemmer