Data Breach Hangover: Target's Profits Down 12%
As an IT consultant, tech contractor, or programmer, you usually focus on security from the technical perspective, so it's easy to forget that it can have a real effect on a company's bottom line. Case...
View ArticleHome-Grown Data Breaches: How the Internet of Things Is Increasing Your Exposure
The investment resource site MotleyFool reports that Apple announced it would produce software designed to work with the Internet of Things, joining its competitors Google, Microsoft, and Samsung in...
View ArticleAn Easier Way to Prevent Client Data Breaches
If you follow this blog at all, you know that the threat of client data breaches is everywhere. And as you likely know, when clients are the target of a data breach, they often point the finger at...
View ArticleHome-Grown Data Breaches: How the Internet of Things Is Increasing Your Exposure
The investment resource site MotleyFool reports that Apple announced it would produce software designed to work with the Internet of Things, joining its competitors Google, Microsoft, and Samsung in...
View Article$4.8 Million HIPAA Settlement Over Data Breach Is Largest to Date
The National Law Review reports that the Office of Civil Rights (OCR) recently required two New York healthcare organizations to pay a joint $4.8 million settlement, the largest ever for a HIPAA data...
View ArticleAn Easier Way to Prevent Client Data Breaches
If you follow this blog at all, you know that the threat of client data breaches is everywhere. And as you likely know, when clients are the target of a data breach, they often point the finger at...
View Article12% of iOS Users Are Screechin’ for a Breachin’ (a Data Breachin’)
According to Apple's iOS statistics, 12 percent of its users are still using old versions of the mobile operating system (iOS 6 or earlier), which puts them at serious risk for data breaches. As iOS 7...
View ArticleHome-Grown Data Breaches: How the Internet of Things Is Increasing Your Exposure
The investment resource site MotleyFool reports that Apple announced it would produce software designed to work with the Internet of Things, joining its competitors Google, Microsoft, and Samsung in...
View Article$4.8 Million HIPAA Settlement Over Data Breach Is Largest to Date
The National Law Review reports that the Office of Civil Rights (OCR) recently required two New York healthcare organizations to pay a joint $4.8 million settlement, the largest ever for a HIPAA data...
View ArticleSpotify Hack Shows BYOD Risks and Small Data Breach Costs
The Washington Post reports that Spotify – one of the leading online radio and music streaming services – was hacked, and though initial reports suggest that the data breach was an extremely small one,...
View ArticleCourt Ruling: Cyber Security Is Super-Duper Important
Insurance Journal reports on a court case that confirms what we in the insurance business have warned our customers about for a long time: while General Liability Insurance covers many lawsuits, it...
View ArticleRe: Your Recent Spear Phishing Attack
Unless you're an IT professional who lives in Hawaii, most of the time you say the phrase "spear phishing" when you're referring to an email that looks friendly but really contains malware. If you are...
View Article4 Resources to Help You Track Your Hacks
If you’re a security expert or IT consultant, one of your professional responsibilities is to keep track of the security threats that could cause data breaches on your clients’ networks. Because the...
View ArticleRe: Your Recent Spear Phishing Attack
Unless you're an IT professional who lives in Hawaii, most of the time you say the phrase "spear phishing" when you're referring to an email that looks friendly but really contains malware. If you are...
View Article4 Resources to Help You Track Your Hacks
If you’re a security expert or IT consultant, one of your professional responsibilities is to keep track of the security threats that could cause data breaches on your clients’ networks. Because the...
View ArticleRe: Your Recent Spear Phishing Attack
Unless you're an IT professional who lives in Hawaii, most of the time you say the phrase "spear phishing" when you're referring to an email that looks friendly but really contains malware. If you are...
View ArticleIt's Not Just You: Data Breaches Are Getting Sneakier
Symantec has released its 2014 Internet Security Threat Report, compiling data on trends in email security and cyber risk over the last two years. Here are some of the key findings:Malicious email...
View ArticleJuly Is Beach Season – And Breach Season (but Not Breech Season)
Symantec's study on data breaches, the 2014 Internet Security Threat Report, provides scores of useful and fascinating statistics on data breaches, including this shocker: July is peak season for data...
View ArticleYour Clients Want the Cloud? Make Sure They Know the Risks
So your clients want to move their applications or IT solutions to the cloud. Likely, they’ve heard about the many benefits touted by cloud services and products, which typically promise data...
View ArticleCyber Crime Costing Almost as Much as Drug Crime
The Center for Strategic and International Studies has issued a report on the total cost of cyber crime, and what it found is astonishing. According to the Washington Post, this report (sponsored by...
View Article