Latest Post

Loading...
When data recovery becomes a data disaster...

Your server crashed. You dropped your storage device. Your computer drive failed. And there’s no back-up in sight. Who ya gonna call? A data recovery vendor, of course. Not so fast. Before you madly dial for help, beware of unscrupulous providers who turn data recovery services into data breach...

Read More When data recovery becomes a data disaster
Expanding the scope of security testing...

Continual testing is one of the main tenants of data breach prevention. Your network has to remain secure to ward off attacks. The typical security test, known as a penetration test, provides a point-in-time view of your security, limiting your scope of...

Read More Expanding the scope of security testing
Students and cyber defense...

This vulnerability, combined with the fact that stealing personal information from minors can go undetected for years, is just part of the reason why minors are 51 times more likely to suffer from identity theft than...

Read More Students and cyber defense
Are you in hiding after a data breach? Watch our new v...

...

Read More Are you in hiding after a data breach? Watch our new video.
Five top trends in security threats...

Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies. Symantec’s study Internet Security Threat Report offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie....

Read More Five top trends in security threats
Consequences following a data breach...

Our latest study, Aftermath of a Data Breach Study, was conducted to better understand how a data breach affects organizations over the long...

Read More Consequences following a data breach
‘Tis the season for data privacy...

As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which personal information is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about...

Read More ‘Tis the season for data privacy
How data breaches harm reputations...

The Ponemon study clearly shows that when data breaches occur, the collateral damage of a company’s brand and reputation become significant hard costs that must be factored into the total financial loss....

Read More How data breaches harm reputations
Quick glance: data breach litigation & legislatio...

With the recent spate of data breaches and accompanying class action lawsuits, businesses have constant reminders that an ounce of prevention is worth a pound of cure. The best way to protect your business against the high costs of data breaches is to ensure your security practices and fraud...

Read More Quick glance: data breach litigation & legislation in 2012
Resources for managing your enterprise security and pr...

Here’s a look at some of the resources I find useful in testing and training for a data b...

Read More Resources for managing your enterprise security and privacy risk in the new year
Data breaches don’t take a holiday at the arcade...

A recent data breach discovery serves as a reminder that even when you’re on vacation, cyber criminals never s...

Read More Data breaches don’t take a holiday at the arcade
Year of the breach: 2011 in review...

Several high profile events throughout the year have kept the spotlight on the issue of data exposures, especially those where millions of consumers information was obtained by malicious hackers. Although the information involved, emails and passwords, does not rise to the level of a “personal identifying information” (PII) breach,...

Read More Year of the breach: 2011 in review