Category: Uncategorized

May 11, 2017

Are You Doing Enough to Protect Your Customers’ Data?

Protecting sensitive customer data on your networks isn’t just the right thing to do – it may now be a legally sanctioned practice. Recently the Federal Trade Commission (FTC) was granted broad authority to penalize companies that had inadequate cybersecurity practices in place to protect their customers’ information from data breaches.

Read More
May 08, 2017

Phishing Scam Targets Human Resources Professionals

The IRS recently issued an alert, warning Human Resources or Payroll professionals to be on the lookout for an email scheme designed to steal employee data from W-2 forms. The scam has already claimed some high profile victims, such as Snapchat, and is especially threatening as employees are in the midst of tax season.

Read More
May 04, 2017

Can Your Employees’ Personal Identity Theft Affect Your Organization?

Identity theft continues to grow at an alarming rate. Statistics show that 3% of the U.S. population experienced credit card fraud at least once in 2014. Not to mention that, “an estimated 17.6 million persons were victims of one or more incidents of identity theft,” in the same year, as reported by theU.S. Department of Justice. This is up by a significant amount from the 16.6 million cases of identity theft in 2012.

Read More
May 01, 2017

7 Benefits to Providing Identity Theft Protection to Your Employees

Among all of the security features a company needs in order to truly protect itself, it’s easy to forget about the most important aspect of an organization that needs to stay out of harm’s way – its people. Employees are becoming increasingly more vulnerable to cyber threats, just as your company is as a whole.

Read More
April 27, 2017

The Anatomy of an Email Data Breach

Verizon’s recent announcement of a data breach in their Enterprise Solutions unit is just the most recent of a staggeringly high number of organizational data breaches in the U.S.

Read More
April 24, 2017

4 Steps You Can Take to Safeguard Protected Health Information

The digitization of medical care has become a double-edged sword. Healthcare providers like Kaiser Permanente have used medical records to improve the health of their members. In 2015, the National Committee for Quality Assurance found that Kaiser Permanente ranked first in 21 different healthcare quality measures, more than any other health plan in the country. Kaiser’s quality of care is due in no small part to its sophisticated medical records system.

Read More
April 20, 2017

How to Identify and Prevent Insider Data Breaches

A little known fact about corporate identity theft is that a large percentage of data breaches originate inside the organization’s walls. A recent report by Intel estimates that 43% of data breaches are the result of insider threats. Half of the insider breaches came from employee negligence and half came from malicious actions.

Read More
April 17, 2017

How to Protect Your Business From Tax Scams

Do you think the IRS is protecting your personal information from cyber thieves? Apparently the Government Accountability Office (GAO) doesn’t think so. In a March 2016 report titled, “IRS Needs to Further Improve Controls Over Financial Taxpayer Data”, the GAO found that 28 vulnerabilities that the IRS claimed to have resolved have still not been fixed.

Read More
April 13, 2017

Are You Protected if Your Supply Chain Gets Hacked?

In today’s world, it’s not uncommon for organization’s to have some type of system in place to protect themselves from a potential data breach. Many use secure password protocols, two factor authentication logins and even invest in cyber education for their employees to minimize the possibility of insider breaches.

Read More
April 10, 2017

5 Ways to Better Secure Your Employees’ Passwords

As providers of comprehensive cybersecurity solutions, we’re often asked how an organization can better ensure that their employees are being safe online. There are numerous ways to prevent a data breach, from the implementation of a threat intelligence tool to network security protocols thatscreen your supply chain.

Read More

Please fill in the form below to subscribe to our blog