Latest Post

Loading...
Forecast spotlight: What the rise of IoT means for fut...

The Internet of Things (IoT) is no longer a futuristic concept. It’s our reality, and with devices dropping in price and growing in availability, the IoT has already made its way into many aspects of how we live and work. Recent data suggests this trend is only going to...

Read More Forecast spotlight: What the rise of IoT means for future data breaches
Make these resolutions for a more secure 2018...

Just as people make New Year’s Resolutions related to personal goals, companies should also take the beginning of the year as an opportunity to reflect on areas of improvement, with cybersecurity being one of the most pertinent. The number of data breaches only increased in 2017, further proving that...

Read More Make these resolutions for a more secure 2018
Predictions for the data breach industry in 2018...

High-profile data breaches dominated the headlines in 2017, and unfortunately, these attacks are anticipated to only increase in frequency and magnitude in 2018. Breaches like those that affected LinkedIn, Dropbox and Yahoo, serve as a wake-up call for organizations to implement processes for safeguarding sensitive data and defending against...

Read More Predictions for the data breach industry in 2018
THIS IS ONLY A DRILL (FOR NOW): HOW TO CONDUCT A DATA ...

“Are we next?” That’s the question companies around the world are grappling with as more high-profile data breaches make headlines. At a time when one in four organizations experience cyber-attacks, mishandling the response can do more damage than the breach itself. We take precautions against dangerous situations every day....

Read More THIS IS ONLY A DRILL (FOR NOW): HOW TO CONDUCT A DATA BREACH RESPONSE DRILL
How to build a bulletproof internal data breach respon...

We recently released the latest edition of our Data Breach Response Guide, a resource we’re proud to offer to business leaders to help them navigate the often-nebulous waters of incident response planning. As the threat of data breaches become no longer a matter of “if” but “when,” it’s never...

Read More How to build a bulletproof internal data breach response team
Myth Buster: Most Consumers Aren’t at Risk for Identit...

Businesses may be increasingly aware of identity theft threats to their customers, but an Experian survey shows that many consumers still seriously underestimate their risk of falling victim to identity thieves. In fact, the persistent and harmful myth that the majority of consumers are not vulnerable to identity theft...

Read More Myth Buster: Most Consumers Aren’t at Risk for Identity Theft
Is Your Company Prepared to Deal with Dark Web Threats...

Everyone knows that the 90 percent of the iceberg below water, the part you can’t see, is the portion that can rip through the hull of a boat like damp paper. The dark web is the internet’s version of the submerged iceberg, and what happens there has the potential...

Read More Is Your Company Prepared to Deal with Dark Web Threats
TalkTalk fine’s message – regulators and consumers hol...

For the second time in less than a year, the United Kingdom’s data security regulator has fined one of the nation’s largest telecom companies for failing to protect customer data. The fine, and strongly worded comments from Information Commissioner Elizabeth Denham, should be a fresh wakeup call to all...

Read More TalkTalk fine’s message – regulators and consumers hold breached companies accountable
The Key Role of Cybersecurity When Strategizing Your C...

Companies around the world, of every size and in every industry, are engaging in digital transformation, as they seek to leverage technology to enhance efficiency, innovate products, automate processes and transform virtually every aspect of their operations. Some are doing so strategically, focusing on the big picture of how...

Read More The Key Role of Cybersecurity When Strategizing Your Company’s Digital Transformation
The Rise of Nation-State-Sponsored Ransomware and How ...

As if ransomware attacks weren’t diabolical enough, a new wrinkle may be emerging — hiding something even worse behind the ransomware assault. The recent Petya and WannaCry incidents, which affected hundreds of thousands of people plugged into networks in more than 150 countries, are examples of the latest trend...

Read More The Rise of Nation-State-Sponsored Ransomware and How Businesses Can Protect Themselves
Why companies should offer post-breach monitoring serv...

When a cybersecurity incident occurs, will your organization’s data breach response contribute to customer retention or undermine it? Multiple studies and surveys illustrate that how well a company supports consumers in the wake of a security event directly affects customers’ perceptions of and loyalty to the breached company. Consumers...

Read More Why companies should offer post-breach monitoring services
When thinking M&A, think cybersecurity...

When companies merge, acquire or are acquired, they’re exposed to a variety of threats during the transaction period, including ones that could potentially terminate the deal such as cybersecurity risks. Managing data breach and other cybersecurity risks must be a top priority for both acquired and acquiring companies to...

Read More When thinking M&A, think cybersecurity