Quantcast
Browsing all 88 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

What the Schnucks Judgment Means for Insurers

By Eduard Goodman Schnucks, the grocery chain based in the Midwest, is mostly off the hook for a data breach that hit 2.4 million customers a few years back. But the case still provides an object...

View Article


Image may be NSFW.
Clik here to view.

What You Need to Know About Canada’s New Data Breach Law

By Eduard Goodman After years and several failed attempts, the Canadian government has successfully passed a federal data breach notification requirement. The Digital Privacy Act, which received Royal...

View Article


Image may be NSFW.
Clik here to view.

Educational Software and Privacy in the Classroom: What You Need to Know

By Eduard Goodman Educational software platforms are becoming more common in the classroom, raising privacy issues about the data they collect on children.The market for educational software and...

View Article

Image may be NSFW.
Clik here to view.

When Mother Doesn't Know Best: Family Fraud Hits Daughter Hard

Dealing with identity theft is bad enough when you don’t know the perpetrator, but imagine if the criminal turned out to be a trusted family member.Imagine if the criminal were your mom.That’s what...

View Article

Image may be NSFW.
Clik here to view.

Don’t Make These Mistakes When Choosing a Cyber Claims Provider

By Joe SalpietroBusinesses are becoming more interested in cyber coverage as they face mounting risks to their data security. But finding the right carrier and product can be challenging. Here are four...

View Article


Image may be NSFW.
Clik here to view.

Ask the Expert: 'We Are Losing the Game' Against Cyber Threats

The cyber security industry faced steep challenges in 2015, and the battle against hackers and other threats to corporate data looks bleak, according to Natalya Kaspersky, co-founder of Kaspersky Lab....

View Article

Image may be NSFW.
Clik here to view.

Ask the Expert: Data Is a Valuable Asset Companies Must Protect

There's a steep price to pay for all those empowering free online services, such as web searches and email: It's your privacy. Every move you make online is routinely logged, stored and data-mined by...

View Article

Image may be NSFW.
Clik here to view.

Identity Theft and Data Security Trends to Watch in 2016

By Byron Acohido Will cyber exposures subside in the new year? Highly unlikely, according to data security and privacy experts.Trends to expect: an increase in tax and child identity theft, wire...

View Article


Image may be NSFW.
Clik here to view.

4 Reasons Why Cyber Claims Are Denied

By Joe Salpietro  Helping clients get the most out of their cyber coverage means making sure they get their claims covered when a breach or security event occurs. By understanding the most common...

View Article


Image may be NSFW.
Clik here to view.

Companies in All Industries Are Losing Patient Health Data

By Rodika TollefsonEach time a Community Health Systems or an Anthem or a Premera Blue Cross gets hacked, sensitive patient records flood into the cyber underground. But cyber thieves are by no means...

View Article

Image may be NSFW.
Clik here to view.

Keep Employee Trust After a Breach

By Matt Cullina Employee trust is slow to build but quick to lose, especially after a data breach. Morale may dip as employees watch their workplace become the subject of scrutiny and scorn in the...

View Article

Image may be NSFW.
Clik here to view.

SMBs Better Get Ready for More Ransomware Attacks

By Byron AcohidoIn a ransomware attack, victims are prevented or limited from accessing their systems. Cyber criminals attempt to extort money by first using malware to encrypt the contents of a...

View Article

Image may be NSFW.
Clik here to view.

4 Ways to Protect Your Business Data in the Cloud

By Eduard Goodman More companies are using the cloud for storage, software and even infrastructure services. This growing trend has changed the way businesses handle data—and, unfortunately, it also...

View Article


Image may be NSFW.
Clik here to view.

Spear Phishing Gets Sophisticated, Targets CEOs

By Gary Stoller Spear phishers continue to pierce even well-defended networks, causing grave financial wounds. Spear phishers lure a specific individual to click on a viral email attachment or to...

View Article

Image may be NSFW.
Clik here to view.

Cyber Criminals Target Social Media, Apps for Phishing Attacks

By Jaikumar VijayanPhishers have begun leveraging the trust people have in popular social media and cloud collaboration websites to trick people into downloading malware or parting with sensitive...

View Article


Image may be NSFW.
Clik here to view.

4 Things You Should Know About the EU-U.S. Privacy Shield

By Byron AcohidoAmerican whistle-blower Edward Snowden and Austrian citizen Maximilian Schrems are happenstance collaborators who together forced the United States and Europe to formally address an...

View Article

Image may be NSFW.
Clik here to view.

SMBs Take a Step Back with Breach Defense

By Evan SchumanDespite rising cyber exposures and intensifying attacks, small and midsize businesses actually may be regressing when it comes to defending their networks.That startling finding comes...

View Article


Image may be NSFW.
Clik here to view.

IRS Fights Fraud, Slows Tax Refunds

By Rodika TollefsonThe Internal Revenue Service is taking up to 21 days to review tax returns, according to research from fraud prevention vendor iovation, a clear sign that Uncle Sam has stepped up...

View Article

Image may be NSFW.
Clik here to view.

Why Business Email Compromise is Skyrocketing

By Byron AcohidoIt is a devastatingly effective form of spear phishing that the FBI refers to as “business email compromise,” or a BEC attack.Also known as “whaling” and “CEO fraud,” BEC attacks carry...

View Article

Image may be NSFW.
Clik here to view.

Cyber Liability Insurance is the 'Wild, Wild West'

By Byron Acohido A convergence between the cyber insurance and tech security sectors is fast gaining momentum. If this trend accelerates, it could help commercial cyber liability policies arise as a...

View Article
Browsing all 88 articles
Browse latest View live