6 Reasons Why Changes to Rhode Island's Breach Laws Won't Work
By Eduard GoodmanThe main reason why? Legislators are asking for a 14-day notification timeframe, but that can lead to a number of problems. Responding to a breach is complicated. Organizations first...
View ArticleInsurance Professional Navigates Tax Fraud Nightmare
Tax fraud happens all the time. And without the right resources at your back, it can be a nightmare. Just ask Melissa Richardson. When Richardson efiled her 2013 tax return through a popular online...
View ArticleSavvy Financial Advisor Falls Victim to Identity Theft
Having worked in the financial industry for 31 years, Jay Smith* thought he knew how to protect himself against identity theft. But when identity thieves began rapidly opening new accounts the day...
View Article5 Habits of Highly Successful CISOs
By Deena CoffmanBusinesses of all sizes—from international corporations to local coffee shops—must concern themselves with data privacy. Curious about your company’s security posture? See if you’re...
View ArticleWhat the Schnucks Judgment Means for Insurers
By Eduard Goodman Schnucks, the grocery chain based in the Midwest, is mostly off the hook for a data breach that hit 2.4 million customers a few years back. But the case still provides an object...
View ArticleWhat You Need to Know About Canada’s New Data Breach Law
By Eduard Goodman After years and several failed attempts, the Canadian government has successfully passed a federal data breach notification requirement. The Digital Privacy Act, which received Royal...
View ArticleEducational Software and Privacy in the Classroom: What You Need to Know
By Eduard Goodman Educational software platforms are becoming more common in the classroom, raising privacy issues about the data they collect on children.The market for educational software and...
View ArticleWhen Mother Doesn't Know Best: Family Fraud Hits Daughter Hard
Dealing with identity theft is bad enough when you don’t know the perpetrator, but imagine if the criminal turned out to be a trusted family member.Imagine if the criminal were your mom.That’s what...
View ArticleDon’t Make These Mistakes When Choosing a Cyber Claims Provider
By Joe SalpietroBusinesses are becoming more interested in cyber coverage as they face mounting risks to their data security. But finding the right carrier and product can be challenging. Here are four...
View ArticleAsk the Expert: 'We Are Losing the Game' Against Cyber Threats
The cyber security industry faced steep challenges in 2015, and the battle against hackers and other threats to corporate data looks bleak, according to Natalya Kaspersky, co-founder of Kaspersky Lab....
View ArticleAsk the Expert: Data Is a Valuable Asset Companies Must Protect
There's a steep price to pay for all those empowering free online services, such as web searches and email: It's your privacy. Every move you make online is routinely logged, stored and data-mined by...
View ArticleIdentity Theft and Data Security Trends to Watch in 2016
By Byron Acohido Will cyber exposures subside in the new year? Highly unlikely, according to data security and privacy experts.Trends to expect: an increase in tax and child identity theft, wire...
View Article4 Reasons Why Cyber Claims Are Denied
By Joe Salpietro Helping clients get the most out of their cyber coverage means making sure they get their claims covered when a breach or security event occurs. By understanding the most common...
View ArticleCompanies in All Industries Are Losing Patient Health Data
By Rodika TollefsonEach time a Community Health Systems or an Anthem or a Premera Blue Cross gets hacked, sensitive patient records flood into the cyber underground. But cyber thieves are by no means...
View ArticleKeep Employee Trust After a Breach
By Matt Cullina Employee trust is slow to build but quick to lose, especially after a data breach. Morale may dip as employees watch their workplace become the subject of scrutiny and scorn in the...
View ArticleSMBs Better Get Ready for More Ransomware Attacks
By Byron AcohidoIn a ransomware attack, victims are prevented or limited from accessing their systems. Cyber criminals attempt to extort money by first using malware to encrypt the contents of a...
View Article4 Ways to Protect Your Business Data in the Cloud
By Eduard Goodman More companies are using the cloud for storage, software and even infrastructure services. This growing trend has changed the way businesses handle data—and, unfortunately, it also...
View ArticleSpear Phishing Gets Sophisticated, Targets CEOs
By Gary Stoller Spear phishers continue to pierce even well-defended networks, causing grave financial wounds. Spear phishers lure a specific individual to click on a viral email attachment or to...
View ArticleCyber Criminals Target Social Media, Apps for Phishing Attacks
By Jaikumar VijayanPhishers have begun leveraging the trust people have in popular social media and cloud collaboration websites to trick people into downloading malware or parting with sensitive...
View Article4 Things You Should Know About the EU-U.S. Privacy Shield
By Byron AcohidoAmerican whistle-blower Edward Snowden and Austrian citizen Maximilian Schrems are happenstance collaborators who together forced the United States and Europe to formally address an...
View Article