Latest Posts

Loading...

Data breaches occur in every industry, but, in healthcare, they’re a whole different ballgame. Black market prices and mobile devices drive data theft and...

Published: April 10, 2012 by bkrenek

It’s no secret that healthcare data breaches are steadily on the rise.  As technology has modernized healthcare, it has also made healthcare more vulnerable...

Published: April 3, 2012 by bkrenek

As companies accumulate vast amount of data to improve their business intelligence, the risks of data breaches accumulate accordingly.  While organizations are rapidly increasing...

Published: March 27, 2012 by ofonseca

As far as data security goes, 2011 was a dismal year.  Relentless, high-profile breaches punctured any sense that hack attacks are a remote threat,...

Published: March 20, 2012 by bkrenek

Download the Ponemon Aftermath Study to learn what companies experience following a data...

Published: March 12, 2012 by ofonseca

Customers see a data breach and the loss of their personal data as a threat to their security and finances, and with good reason....

Published: March 5, 2012 by bkrenek

Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). As an organization specializing in monitoring and tracking data...

Published: February 28, 2012 by kbarney

Your server crashed. You dropped your storage device. Your computer drive failed. And there’s no back-up in sight. Who ya gonna call? A data...

Published: February 21, 2012 by ofonseca

Continual testing is one of the main tenants of data breach prevention. Your network has to remain secure to ward off attacks. The typical...

Published: February 15, 2012 by tbowers

This vulnerability, combined with the fact that stealing personal information from minors can go undetected for years, is just part of the reason why...

Published: February 7, 2012 by bkrenek

Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies. Symantec’s study Internet Security...

Published: January 31, 2012 by ofonseca