Category: Data Breach

should you diclose a data breach represented by the words "hacking detected" in red on a blue and white touchscreen
January 04, 2021

Should Your Business Publicly Disclose a Data Breach?

Should you disclose a data breach? These statistics tell you the truth about the positives & negatives of disclosing a data breach.

Read More
outbound email data breach risk represented by a blue background with lighter blue envelopes on it and one red envelope i a target circle
November 12, 2020

Remote Workers Increase Outbound Email Data Breach Risk

Are you considering your outbound email data breach risk? It’s an often-overlooked factor that’s amplified by supporting a remote workforce.

Read More
November 03, 2020

Will the Vastaamo Patient Data Breach Set a GDPR Penalty Record?

The huge data breach at Vastaamo is setting a new standard for ransomware demands as cybercriminals try a new kind of double extortion. Will it also set a new GDPR penalty record?

Read More
us election cybersecurity 2020 concers represented by a blue US map and a red, white, and blue "vote" pin with a shadowy hacker overlay.
November 02, 2020

The 3 Threats to Watch for Election 2020 Cybersecurity

These are the 3 threats to Election 2020 cybersecurity (and your business) – and how they can be mitigated.

Read More
October 26, 2020

2020 Election Cybersecurity Fears Boosted by New Hacked Voter Data in Dark Web Markets

As election cyberattacks start to pile up, hacked voter data including 1.45 million records just hit the Dark Web, raising election security fears around cyberattacks.

Read More
DIY Dark Web monitoring danger represented by a hacker in a noodie hunched over a black computer in front of a glowing world map
October 21, 2020

5 Reasons Why You Can’t DIY Dark Web Monitoring

Security awareness training , especially for phishing resistance, reduces cybersecurity incidents dramatically – if you maintain it properly. Here’s how.

Read More
stolen data in the pot aty a dark web poker game represented by a computer keyboard with poker ships and cards on it.
October 20, 2020

Is Your Stolen Data in the Pot at a Poker Game?

Cybercriminals are hungry for data like PII and password lists, because data is currency on the Dark Web, and used for everything from payments to poker games.

Read More
nation-state federal hack phishing described by a man in a hoodie sillohuettes adgains a world map with "hacked" stamped on it

10 Facts About Cyberattacks & Cybercrime That You Need to Read

These essential facts about cyberattacks and cybercrime are a must-read to grasp the scope of today’s dangerous cybersecurity landscape!

Read More
supply chain risk represented by a world map in blute digitized with pathways showing business relationships
September 28, 2020

10 Facts About Supply Chain Risk You Need to See

You’re paying attention to cybersecurity best practices but are your suppliers and service providers? Here’s how to mitigate supply chain risk from sloppy third party cybersecurity dangers.

Read More
cybersecurity disasters in 2020
September 16, 2020

10 Facts About Cybersecurity Disasters in 2020

Don’t update your incident response plan until you see these 10 facts about cybersecurity disasters in 2020 & get 2 essential tools for 2021

Read More

Please fill in the form below to subscribe to our blog