Breach Prevention

Students and cyber defense

Posted on Feb 07 2012 by

This vulnerability, combined with the fact that stealing personal information from minors can go undetected for years, is just part of the reason why minors are 51 times more likely to suffer from identity theft than adults.

Share

Are you in hiding after a data breach? Watch our new video.

Posted on Jan 31 2012 by

httpv://youtu.be/KTHWhscxGeU

Share

Five top trends in security threats

Posted on Jan 31 2012 by

Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies. Symantec’s study Internet Security Threat Report offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie.

Share

‘Tis the season for data privacy

Posted on Jan 24 2012 by

As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which personal information is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about how to best shield themselves from risks.

Share

Quick glance: data breach litigation & legislation in 2012

Posted on Jan 10 2012 by

With the recent spate of data breaches and accompanying class action lawsuits, businesses have constant reminders that an ounce of prevention is worth a pound of cure. The best way to protect your business against the high costs of data breaches is to ensure your security practices and fraud resolution plans are strongly built to ward off malicious attacks and the complications that follow.

Share

Resources for managing your enterprise security and privacy risk in the new year

Posted on Jan 03 2012 by

Here’s a look at some of the resources I find useful in testing and training for a data breach.

Share

Data breaches don’t take a holiday at the arcade

Posted on Dec 27 2011 by

A recent data breach discovery serves as a reminder that even when you’re on vacation, cyber criminals never sleep.

Share

Year of the breach: 2011 in review

Posted on Dec 20 2011 by

Several high profile events throughout the year have kept the spotlight on the issue of data exposures, especially those where millions of consumers information was obtained by malicious hackers. Although the information involved, emails and passwords, does not rise to the level of a “personal identifying information” (PII) breach, it is definitely troubling that such a large number of consumers may become targets of phishing and related attacks, which do attempt to get consumers PII.

Share

Holiday travel without data leaks

Posted on Dec 13 2011 by

The average value of a lost laptop is $49,246, a number based on several factors: replacement cost, detection, forensics, data breach, lost intellectual property costs, lost productivity and legal, consulting and regulatory expenses.

Share

Avoiding holiday scams

Posted on Dec 06 2011 by

With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape. Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and retailers.

Share