Tag: Data Breach

Loading...
Trilogy: Increasing engagement in cybersecurity (Part ...

Cybersecurity cannot be successful if siloed. The entire organization must be part of the effort. Take these steps to ensure a more engaged relationship...

Read More Trilogy: Increasing engagement in cybersecurity (Part 3)
Trilogy: Increasing engagement in cybersecurity (Part ...

There’s a consensus that too many C-suite executives are disengaged with their organization’s cybersecurity efforts. That indifference can seriously hamper an organization’s ability to...

Read More Trilogy: Increasing engagement in cybersecurity (Part 2)
Trilogy: Increasing engagement in cybersecurity (Part ...

Leadership and Cybersecurity Multiple studies suggest many executives aren’t as engaged as they should be when ensuring their organizations are prepared to mitigate and...

Read More Trilogy: Increasing engagement in cybersecurity (Part 1)
5 riskiest states of 2016...

With the recent switch to EMV and more than 4.2 billion records exposed by data breaches last year*, attackers are migrating their fraud attempts...

Read More 5 riskiest states of 2016
4 tips to secure your network...

Internet-connected devices provide endless possibilities, but they rely on technology and collected data to deliver on their promises. This can compromise your network security....

Read More 4 tips to secure your network
Happy Holidays! You’ve been breached....

Happy holidays! It’s the holiday season and a festive time of year. Colorful lights, comfort food and holiday songs – all of these things...

Read More Happy Holidays! You’ve been breached.
Vulnerabilities in the Internet of Things...

Every day, millions of new things get connected online, such as toasters, heart monitors and cars. Many of these things have weak security controls...

Read More Vulnerabilities in the Internet of Things
Customer intelligence elevates data confidence...

Leveraging customer intelligence in the age of mass data compromise Hardly a week goes by without the media reporting a large-scale hack of sensitive...

Read More Customer intelligence elevates data confidence
Surveillance, staging and the fraud lifecycle...

Imagine the following scenario: an attacker acquires consumers’ login credentials through a data breach. They use these credentials to test account access and observe...

Read More Surveillance, staging and the fraud lifecycle
More consumers are doing nothing after a data breach...

The experience of being a victim of data breaches has created a shift in consumer behavior and attitude over the past year. A recent...

Read More More consumers are doing nothing after a data breach
After a Breach… Now What?...

The news of the latest breach last week reported that tens of millions of customer and employee records were stolen by a sophisticated hacker...

Read More After a Breach… Now What?
Survey finds consumers expect more from breached organ...

As data breaches continue to attract publicity, consumers are expecting more from impacted organizations....

Read More Survey finds consumers expect more from breached organizations
Importance of a data breach response plan...

A recent study conducted by the Ponemon Institute found that a data breach is among the top three occurrences that affect brand reputation, along...

Read More Importance of a data breach response plan
6 Key Predictions on How Data Breach Concerns Will Evo...

By: Maria Moynihan In less than a year, my information has been compromised twice by a data breach.  The companies involved varied significantly by...

Read More 6 Key Predictions on How Data Breach Concerns Will Evolve in 2014
More companies managing cyber security as a business r...

The growing cost and number of data breaches has spurred more interest in cyber insurance. While companies often increase investments in technology and training...

Read More More companies managing cyber security as a business risk