Breach Prevention

Loading...
The compliance risks of social media...

Organizations are adopting social media tools within their networks at increasing rates, yet the legal and compliance risks are often not fully understood or addressed.  A recent Forrester report noted that more than half of security decision-makers and influencers at enterprises reported that they were “concerned” or “very concerned”...

Read More The compliance risks of social media
ITRC report identifies top three data breach triggers...

For a company, a data breach can seem like it comes out of the blue. Yet, according to analysis by the Identity Theft Resource Center (ITRC), the three primary causes of data breaches have remained the same since 2009: Hacking Data on the move Insider theft ITRC has been releasing...

Read More ITRC report identifies top three data breach triggers
Responding resourcefully to medical data breaches...

It’s safe to say that healthcare data is/are under attack. Breaches of medical records increased 97% from 2010 to 2011 according to HHS data. Statistics like that lend new urgency and importance to gatherings such as the upcoming HCCA 2012 Compliance Institute. Be prepared: Does your organization observe security...

Read More Responding resourcefully to medical data breaches
Big data can mean big breaches...

As companies accumulate vast amount of data to improve their business intelligence, the risks of data breaches accumulate accordingly.  While organizations are rapidly increasing their ability to store, process and analyze huge amount of information collected from social networks, sensors, IT systems and other sources, they’re often failing to...

Read More Big data can mean big breaches
Infographic: Unlock data breach facts...

...

Read More Infographic: Unlock data breach facts
When data recovery becomes a data disaster...

Your server crashed. You dropped your storage device. Your computer drive failed. And there’s no back-up in sight. Who ya gonna call? A data recovery vendor, of course. Not so fast. Before you madly dial for help, beware of unscrupulous providers who turn data recovery services into data breach...

Read More When data recovery becomes a data disaster
Expanding the scope of security testing...

Continual testing is one of the main tenants of data breach prevention. Your network has to remain secure to ward off attacks. The typical security test, known as a penetration test, provides a point-in-time view of your security, limiting your scope of...

Read More Expanding the scope of security testing
Students and cyber defense...

This vulnerability, combined with the fact that stealing personal information from minors can go undetected for years, is just part of the reason why minors are 51 times more likely to suffer from identity theft than...

Read More Students and cyber defense
Are you in hiding after a data breach? Watch our new v...

...

Read More Are you in hiding after a data breach? Watch our new video.
Five top trends in security threats...

Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies. Symantec’s study Internet Security Threat Report offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie....

Read More Five top trends in security threats
‘Tis the season for data privacy...

As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which personal information is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about...

Read More ‘Tis the season for data privacy
Quick glance: data breach litigation & legislatio...

With the recent spate of data breaches and accompanying class action lawsuits, businesses have constant reminders that an ounce of prevention is worth a pound of cure. The best way to protect your business against the high costs of data breaches is to ensure your security practices and fraud...

Read More Quick glance: data breach litigation & legislation in 2012