The next big cyber security threat: Your fingers

Posted on Nov 27 2012 by

We’re all familiar with well-known causes of data security breaches and identity fraud; phishing, malware attacks, and lack of cyber security protection are some of the most popular.  A lesser-known but just as lethal culprit in the world of data breaches is surprisingly, a person’s typing skills due to the fact that a simple typo […]

Cyber thieves target retailers during the shop ‘til you drop season

Posted on Nov 20 2012 by

As we approach another season of shopping and consumerism, the retail industry should pay strict attention to the findings in the latest Verizon’s Data Breach Investigations Report (DBIR), an annual data breach information study conducted by the Verizon RISK Team (VERIS) with participation from the U.S. Secret Service and international national cyber security agencies in […]

Feds seek remedies for medical identity theft

Posted on Nov 13 2012 by

As medical data breaches continue to spike, the federal government is seeking remedies to try and prevent medical identity theft.   Nearly 21 million Americans are at risk of having their medical identities stolen after having their healthcare records exposed in data breaches.1 And that’s just since September 2009, when a new breach notification rule took […]

Superstorm Sandy’s wake-up call: Is your data protected from Mother Nature?

Posted on Nov 07 2012 by

As Superstorm Sandy demonstrated to the East Coast during the last week of National Cyber Security Awareness Month; life happens so do you know where your data is? Data breach protection is of such national critical importance, the effects of Sandy prompted Homeland Security chief Janet Napolitano to emphasize the need for more national cyber […]

BYOD leads to data breaches in the workplace

Posted on Nov 01 2012 by

  While technology undoubtedly has made accessing medical information much easier and faster, it also has also provided an increased potential for medical data breaches especially as health personnel begin to use unsecure mobile devices for personal and work use.  With an increase in health care employees using their own tablets and smartphones in the […]

Three tips for choosing a cloud provider

Posted on Oct 23 2012 by

To cloud or not to cloud? That is the question. And while there’s no questioning the convenience and benefits of cloud storage – you can access your data from multiple devices and save space on your own servers – there are questions regarding how secure cloud storage really is. Given recent hacking incidents at bigger-than-big […]

Federal breach notice: A view worth the climb?

Posted on Oct 16 2012 by

Working for a company that navigates 46 different state breach notice laws and a plethora of sector based federal breach notice laws, I’m often asked what I think the likelihood is that the Federal Government will pass a comprehensive data breach notification law that supersedes all the state laws.

Companies Beware: Cyber security escalates in importance

Posted on Oct 09 2012 by

How important is cyber security? October is National Cyber Security Awareness Month for the ninth consecutive year and each year, the designation seems to become more important.

Connecticut gets serious about breach reporting

Posted on Oct 02 2012 by

Get ready, Connecticut. A new data breach law is now in effect that brings the Office of the Attorney General (OAG) into the reporting loop. The new law requires notifying the OAG by email no later than when affected consumers are notified. Previously, businesses were only required to report a breach to consumers. Yet Attorney […]

IAPP Privacy Academy: Will you be there?

Posted on Sep 25 2012 by

Join us for an interactive discussion on key data breach mistakes and how to overcome them on October 11 at the IAPP Privacy Academy in San Jose. Also, stop by the Experian booth to meet our team, network with your peers, and enter for a chance to win an Apple® MacBook Air.