}
Breach planning basics – Part 2

Breach planning basics – Part 2

In our last article, we discussed some steps your company can take in developing an Incident Response Plan (IRP).  Among them were designating a member of management to be responsible for the IRP, and selecting employees from management, IT, legal, marketing, and...
Breach planning basics – Part 1

Breach planning basics – Part 1

We’ve been saying for a long time that no company is safe from a cyber attack. Even small companies that don’t operate in industries typically known for housing sensitive data, such as finance, education, and medicine, still have valuable information that someone...
Employee mistakes a big source of data breaches

Employee mistakes a big source of data breaches

When you think of data breaches, the first thing that likely comes to mind is a hooded figure in a dimly-lit room plotting theft of all your valuable data. But according to a study published by CompTIA it isn’t an unknown hacker that’s most likely to directly...
Mobile Devices Pose Security Risks

Mobile Devices Pose Security Risks

Because smartphones and tablets are now ubiquitous, many companies have adopted “bring your own device” (BOYD) and “corporately owned, personally enabled” (COPE) policies to deal with their use in the workplace.  Even with robust BOYD and COPE safeguards in place,...

Anthem Breach

As you may have heard already, Anthem Inc., the second-largest healthcare insurer in the US, announced on Wednesday that it was cyber attacked. Medical and personally identifiable information (PII) of 80 million customers and employees of the insurance colossus were...
Schools and colleges hit by data breaches too

Schools and colleges hit by data breaches too

Educational institutions are hacked on a regular basis, and the problem shows no signs of getting better anytime soon.  Both K-12 schools and colleges and universities, are victims. “Why?” you might ask.  “Aren’t cyber criminals after credit card numbers and bank...