}
Breach planning basics – Part 2

Breach planning basics – Part 2

In our last article, we discussed some steps your company can take in developing an Incident Response Plan (IRP).  Among them were designating a member of management to be responsible for the IRP, and selecting employees from management, IT, legal, marketing, and...
Breach planning basics – Part 1

Breach planning basics – Part 1

We’ve been saying for a long time that no company is safe from a cyber attack. Even small companies that don’t operate in industries typically known for housing sensitive data, such as finance, education, and medicine, still have valuable information that someone...
Cyber Extortion is Real and Can Be Catastrophic

Cyber Extortion is Real and Can Be Catastrophic

Cyber extortion might sound like the stuff of a Hollywood script, but it is a reality that more and more businesses are facing.  At risk in a digital extortion attack is not only a company’s reputation and data, but also its ability to function and even its very...
Employee mistakes a big source of data breaches

Employee mistakes a big source of data breaches

When you think of data breaches, the first thing that likely comes to mind is a hooded figure in a dimly-lit room plotting theft of all your valuable data. But according to a study published by CompTIA it isn’t an unknown hacker that’s most likely to directly...