Tag: PII

Loading...
The Worst Things You can Say or Do in a Breach Notific...

When a data breach occurs, laws and industry regulations, dictate when and if you need to notify consumers whose data might have been compromised. However, many consumers would also probably argue that you’re morally obligated, to notify them of data loss; they want you to tell them of the...

Read More The Worst Things You can Say or Do in a Breach Notification Letter
Data Breach News for the First Quarter of 2014...

With the first quarter of 2014 drawing to a close, now is a good time to review data breach news from the past four months and consider what that information may indicate about the state of cyber security in American businesses. As of March 21, 2014, 191 data breaches...

Read More Data Breach News for the First Quarter of 2014
Big data can mean big breaches...

As companies accumulate vast amount of data to improve their business intelligence, the risks of data breaches accumulate accordingly.  While organizations are rapidly increasing their ability to store, process and analyze huge amount of information collected from social networks, sensors, IT systems and other sources, they’re often failing to...

Read More Big data can mean big breaches
Expanding the scope of security testing...

Continual testing is one of the main tenants of data breach prevention. Your network has to remain secure to ward off attacks. The typical security test, known as a penetration test, provides a point-in-time view of your security, limiting your scope of...

Read More Expanding the scope of security testing
‘Tis the season for data privacy...

As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which personal information is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about...

Read More ‘Tis the season for data privacy
Resources for managing your enterprise security and pr...

Here’s a look at some of the resources I find useful in testing and training for a data b...

Read More Resources for managing your enterprise security and privacy risk in the new year
Year of the breach: 2011 in review...

Several high profile events throughout the year have kept the spotlight on the issue of data exposures, especially those where millions of consumers information was obtained by malicious hackers. Although the information involved, emails and passwords, does not rise to the level of a “personal identifying information” (PII) breach,...

Read More Year of the breach: 2011 in review
Holiday travel without data leaks...

The average value of a lost laptop is $49,246, a number based on several factors: replacement cost, detection, forensics, data breach, lost intellectual property costs, lost productivity and legal, consulting and regulatory expenses....

Read More Holiday travel without data leaks
Avoiding holiday scams...

With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape. Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and...

Read More Avoiding holiday scams
Ensuring the security of personal identifiable informa...

Everywhere you turn these days there’s word of a new data breach. In the course of our lifetime, our “personal identifying information (PII)” is shared with hundreds of companies, governmental agencies, educational facilities, businesses and health care providers. What can a consumer do to protect their sensitive personal infor......

Read More Ensuring the security of personal identifiable information
Data breaches – to prepare or not to prepare? The answ...

All data breaches have two things in common: the need for prompt resolution and the need for a robust preparedness plan....

Read More Data breaches – to prepare or not to prepare? The answer is simple.
The danger of not having a breach policy in place...

A recent study by Trend Micro indicates data loss is a growing concern for small businesses. The 2010 Corporate End User Study found that close to 60% of business respondents feared that data loss would be the result of data-stealing malware or by intentional or unintentional data leaks outside...

Read More The danger of not having a breach policy in place