Latest Posts › Data Breach

Share:

Response Options For Businesses With Sensitive Data Breaches

Your heart raced when the caller on the phone identified himself as an FBI agent. But the conversation was matter-of-fact. About 2,500 sets of credit card information from your clients had been posted for sale on a...more

What Companies Can Learn from the DNC Hack

In summer 2015, the spies of a foreign country gained access to a private company’s domain name – pick any company you like, or several, since we don’t know which ones or how many. And within those domains, they created false...more

Michigan State Data Breach and the Value of Preparedness

Michigan State University’s announcement earlier this month that hackers had gained access to a school database of about 400,000 records highlights why colleges and universities are such tempting targets for hackers and just...more

Cyber Fatigue: New NIST Study Reveals Consumers Feel Overwhelmed by Security Messages, Compliance

Data breaches. Stolen passwords. Confidential data compromised. We’ve all heard the cybersecurity horror stories. In fact, we may have heard them too often. According to a new study by National Institute of...more

11/14/2016  /  Data Breach , Information Reports , NIST

Cyber Security IMPOSSIBLE: California AG Decides a Ceiling is a Floor

We all know why selecting appropriate data security standards is difficult. No two business are the same. Different businesses have different assets to protect and different bank accounts to tap. Different sized businesses...more

5 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide