Data Breach Costs Often Felt 2 or More Years After Hack
Cyber attacks can cause large amounts of sensitive and valuable data to be exposed via hackers. But cyber attack effects do not end as soon as the data is exposed soon after the attack. The…
Read Moreabout Data Breach Costs Often Felt 2 or More Years After Hack
The U.S. has Lost $1.6 Trillion Due to Data Breaches Since 2008
Since 2008, the United States has lost an overall amount of more than $1.6 trillion due to data breaches alone. Even these figures may be on the low end of the real number lost, however, as…
Read Moreabout The U.S. has Lost $1.6 Trillion Due to Data Breaches Since 2008
Best Cyber Defense Practices May Not Stop Data Breaches
You can read guides on how to best protect sensitive data stored by a 401(k) plan related to its participants and funds. Monitoring and securing accounts on a regular schedule can help make sure that only the…
Read Moreabout Best Cyber Defense Practices May Not Stop Data Breaches
Data Breach Sends Equifax Executive to Jail
Former Equifax CIO Jun Ying has been sentenced to four months in prison for insider trading. Ying was found to have sold Equifax stock after the famed data breach was discovered but before the public was aware…
Read Moreabout Data Breach Sends Equifax Executive to Jail
Recovering from a Data Breach Requires the Professionals
Managing and containing a data breach is not something a normal business person knows how to do. Cyber attackers are more sophisticated than ever and are going to stay a step ahead of a layman…
Read Moreabout Recovering from a Data Breach Requires the Professionals
Half of Manufacturers Have Had a Data Breach in the Last Year
Manufacturing is one of the biggest blue collar industries in the United States, but with technology making manufacturing processes more and more efficient and processes having to be expertly and exactly tracked by computer systems…
Read Moreabout Half of Manufacturers Have Had a Data Breach in the Last Year
Over a Third of Cyber Attacks Come From the Inside
You can install all the top of the line, cutting edge cyber defenses you want, but if your attackers are coming from the inside and already have access to your system, how well can you…
Read Moreabout Over a Third of Cyber Attacks Come From the Inside
Tactics Utilized in Data Breaches
The popular idea of a cyber attack or data breach usually involves a hacker breaking into a computer system. But that is usually not the case. There are a multitude of methods used by cyber…
Read Moreabout Tactics Utilized in Data Breaches
Phishing Attacks More Successful on Mobile
Viewing an entire email in a standard window on a desktop can make it fairly easy to figure out if an email you received is legitimate. You can easily see the sender address, all signatures…
Read Moreabout Phishing Attacks More Successful on Mobile