Quantcast
Channel: Articles
Browsing all 52 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

6 Reasons Why Changes to Rhode Island's Breach Laws Won't Work

By Eduard GoodmanThe main reason why? Legislators are asking for a 14-day notification timeframe, but that can lead to a number of problems. Responding to a breach is complicated. Organizations first...

View Article


Image may be NSFW.
Clik here to view.

Insurance Professional Navigates Tax Fraud Nightmare

Tax fraud happens all the time. And without the right resources at your back, it can be a nightmare. Just ask Melissa Richardson. When Richardson efiled her 2013 tax return through a popular online...

View Article


Image may be NSFW.
Clik here to view.

Savvy Financial Advisor Falls Victim to Identity Theft

Having worked in the financial industry for 31 years, Jay Smith* thought he knew how to protect himself against identity theft. But when identity thieves began rapidly opening new accounts the day...

View Article

Image may be NSFW.
Clik here to view.

5 Habits of Highly Successful CISOs

By Deena CoffmanBusinesses of all sizes—from international corporations to local coffee shops—must concern themselves with data privacy. Curious about your company’s security posture? See if you’re...

View Article

Image may be NSFW.
Clik here to view.

What the Schnucks Judgment Means for Insurers

By Eduard Goodman Schnucks, the grocery chain based in the Midwest, is mostly off the hook for a data breach that hit 2.4 million customers a few years back. But the case still provides an object...

View Article


Image may be NSFW.
Clik here to view.

What You Need to Know About Canada’s New Data Breach Law

By Eduard Goodman After years and several failed attempts, the Canadian government has successfully passed a federal data breach notification requirement. The Digital Privacy Act, which received Royal...

View Article

Image may be NSFW.
Clik here to view.

Educational Software and Privacy in the Classroom: What You Need to Know

By Eduard Goodman Educational software platforms are becoming more common in the classroom, raising privacy issues about the data they collect on children.The market for educational software and...

View Article

Image may be NSFW.
Clik here to view.

When Mother Doesn't Know Best: Family Fraud Hits Daughter Hard

Dealing with identity theft is bad enough when you don’t know the perpetrator, but imagine if the criminal turned out to be a trusted family member.Imagine if the criminal were your mom.That’s what...

View Article


Image may be NSFW.
Clik here to view.

Don’t Make These Mistakes When Choosing a Cyber Claims Provider

By Joe SalpietroBusinesses are becoming more interested in cyber coverage as they face mounting risks to their data security. But finding the right carrier and product can be challenging. Here are four...

View Article


Image may be NSFW.
Clik here to view.

Ask the Expert: 'We Are Losing the Game' Against Cyber Threats

The cyber security industry faced steep challenges in 2015, and the battle against hackers and other threats to corporate data looks bleak, according to Natalya Kaspersky, co-founder of Kaspersky Lab....

View Article

Image may be NSFW.
Clik here to view.

Ask the Expert: Data Is a Valuable Asset Companies Must Protect

There's a steep price to pay for all those empowering free online services, such as web searches and email: It's your privacy. Every move you make online is routinely logged, stored and data-mined by...

View Article

Image may be NSFW.
Clik here to view.

Identity Theft and Data Security Trends to Watch in 2016

By Byron Acohido Will cyber exposures subside in the new year? Highly unlikely, according to data security and privacy experts.Trends to expect: an increase in tax and child identity theft, wire...

View Article

Image may be NSFW.
Clik here to view.

4 Reasons Why Cyber Claims Are Denied

By Joe Salpietro  Helping clients get the most out of their cyber coverage means making sure they get their claims covered when a breach or security event occurs. By understanding the most common...

View Article


Image may be NSFW.
Clik here to view.

Companies in All Industries Are Losing Patient Health Data

By Rodika TollefsonEach time a Community Health Systems or an Anthem or a Premera Blue Cross gets hacked, sensitive patient records flood into the cyber underground. But cyber thieves are by no means...

View Article

Image may be NSFW.
Clik here to view.

Keep Employee Trust After a Breach

By Matt Cullina Employee trust is slow to build but quick to lose, especially after a data breach. Morale may dip as employees watch their workplace become the subject of scrutiny and scorn in the...

View Article


Image may be NSFW.
Clik here to view.

SMBs Better Get Ready for More Ransomware Attacks

By Byron AcohidoIn a ransomware attack, victims are prevented or limited from accessing their systems. Cyber criminals attempt to extort money by first using malware to encrypt the contents of a...

View Article

Image may be NSFW.
Clik here to view.

4 Ways to Protect Your Business Data in the Cloud

By Eduard Goodman More companies are using the cloud for storage, software and even infrastructure services. This growing trend has changed the way businesses handle data—and, unfortunately, it also...

View Article


Image may be NSFW.
Clik here to view.

Spear Phishing Gets Sophisticated, Targets CEOs

By Gary Stoller Spear phishers continue to pierce even well-defended networks, causing grave financial wounds. Spear phishers lure a specific individual to click on a viral email attachment or to...

View Article

Image may be NSFW.
Clik here to view.

Cyber Criminals Target Social Media, Apps for Phishing Attacks

By Jaikumar VijayanPhishers have begun leveraging the trust people have in popular social media and cloud collaboration websites to trick people into downloading malware or parting with sensitive...

View Article

Image may be NSFW.
Clik here to view.

4 Things You Should Know About the EU-U.S. Privacy Shield

By Byron AcohidoAmerican whistle-blower Edward Snowden and Austrian citizen Maximilian Schrems are happenstance collaborators who together forced the United States and Europe to formally address an...

View Article
Browsing all 52 articles
Browse latest View live