Tag: breach prevention

Loading...
When data recovery becomes a data disaster...

Your server crashed. You dropped your storage device. Your computer drive failed. And there’s no back-up in sight. Who ya gonna call? A data recovery vendor, of course. Not so fast. Before you madly dial for help, beware of unscrupulous providers who turn data recovery services into data breach...

Read More When data recovery becomes a data disaster
Expanding the scope of security testing...

Continual testing is one of the main tenants of data breach prevention. Your network has to remain secure to ward off attacks. The typical security test, known as a penetration test, provides a point-in-time view of your security, limiting your scope of...

Read More Expanding the scope of security testing
Are you in hiding after a data breach? Watch our new v...

...

Read More Are you in hiding after a data breach? Watch our new video.
‘Tis the season for data privacy...

As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which personal information is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about...

Read More ‘Tis the season for data privacy
Quick glance: data breach litigation & legislatio...

With the recent spate of data breaches and accompanying class action lawsuits, businesses have constant reminders that an ounce of prevention is worth a pound of cure. The best way to protect your business against the high costs of data breaches is to ensure your security practices and fraud...

Read More Quick glance: data breach litigation & legislation in 2012
Resources for managing your enterprise security and pr...

Here’s a look at some of the resources I find useful in testing and training for a data b...

Read More Resources for managing your enterprise security and privacy risk in the new year
Data breaches don’t take a holiday at the arcade...

A recent data breach discovery serves as a reminder that even when you’re on vacation, cyber criminals never s...

Read More Data breaches don’t take a holiday at the arcade
Year of the breach: 2011 in review...

Several high profile events throughout the year have kept the spotlight on the issue of data exposures, especially those where millions of consumers information was obtained by malicious hackers. Although the information involved, emails and passwords, does not rise to the level of a “personal identifying information” (PII) breach,...

Read More Year of the breach: 2011 in review
Holiday travel without data leaks...

The average value of a lost laptop is $49,246, a number based on several factors: replacement cost, detection, forensics, data breach, lost intellectual property costs, lost productivity and legal, consulting and regulatory expenses....

Read More Holiday travel without data leaks
Avoiding holiday scams...

With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape. Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and...

Read More Avoiding holiday scams
Data breaches make the hospitality industry less hospi...

According to a new report by British insurance firm Willis Group Holdings, insurance claims for data theft worldwide jumped 56% last year, with the largest share of those attacks - 38% - targeting hotels, reports and tour companies. Why are hackers increasingly making themselves at home in the hospitality...

Read More Data breaches make the hospitality industry less hospitable
Counter competitive intelligence: Combating hackers in...

After an in-depth analysis on how hackers find their targets, security and risk professionals can learn 7 key ways to strengthen their infrastructure and reduce risk...

Read More Counter competitive intelligence: Combating hackers in 7 steps