
The Week in Breach: 10/20/2018 – 10/26/2018
Breach news to share with your customers!
Read MoreBreach news to share with your customers!
Read MoreBreach news to share with your customers!
Read MoreThis week ransomware continues to develop, as well as phishing tactics. Popular mobile platform GOMO was breached in a big way, and one of the largest banks in India was robbed over the weekend.
Read MoreYour name, the gender of your kids, your interests, your religion and a lot of the things that make you… well YOU, have been exposed. In the last couple of years, the idea of one’s personal information being obtained by hackers has become more than familiar to the general public. If a website you use is compromised, you change your password. If your credit card was skimmed while filling up your car, you get a new card and contact your bank. One’s digital identity is constantly under attack and most of us have come to accept this. This kind of breach can be countered with identity monitoring, good password hygiene and general attentiveness to one’s activity online. The kind of data that the Florida-based marketing firm Exactis has left exposed, sourced from millions of Americans and businesses, is much more… intimate.
Read MoreThere is a storm brewing over at Facebook. I will reserve summary and comments for next week – after Zuckerberg testifies. I will say however, the simple fact is that you did not/do not need to be a data analytics firm to harvest data and profile millions (potentially billions) of Facebook users. More to come…
Read MoreWhen it comes to protecting your businesses infrastructure, it is safe to assume that you have some form of cyber protection activated. But email communications represent the biggest threat of all, because it takes advantage of the end user, in one form or the other. It generally only requires one misstep from a member of a network to unleash a catastrophic chain of events within that network.
Read MoreIn today’s world, it’s not uncommon for organization’s to have some type of system in place to protect themselves from a potential data breach. Many use secure password protocols, two factor authentication logins and even invest in cyber education for their employees to minimize the possibility of insider breaches.
Read More