The purpose of any type of insurance is to protect your most valuable assets so in order to combat the prevalence of cyber attacks...
Despite President Obama’s January signing of an Executive Order (EO) which outlines national cyber security policies in protecting U.S. companies and government agencies against...
In 2012, data breaches spanned multiple countries across a wide variety of industries. As cloud storage, user mobility and virtualization become more prevalent in...
Responding to a data breach quickly and accurately is the key to minimizing damage and steering clear of litigation and hefty fines. In our...
Who’s next? That’s a question probably lingering on the minds of many American banking executives these days. After all, eight U.S. banks were hammered...
In today’s data driven world, information is king so if you are not armed with the same information as your competitor or worse, experience...
In 2012, FBI Director Robert Mueller stated, “There are only two types of companies: those that have been hacked, and those that will be....
Human errors are the most common threats to exposing a person’s personal information to data breaches according to an analysis of reported data breaches...
Now that your data breach response plan is in place and you’re confident that your company is safeguarded from malicious data breach attempts, what...
As we approach another season of shopping and consumerism, the retail industry should pay strict attention to the findings in the latest Verizon’s Data...
While technology undoubtedly has made accessing medical information much easier and faster, it also has also provided an increased potential for medical data breaches...
Get ready, Connecticut. A new data breach law is now in effect that brings the Office of the Attorney General (OAG) into the reporting...