I am pleased to share the news on this blog that Experian has signed a definitive agreement to acquire CSIdentity Corporation (CSID), a leading...
What difference does $4.40 make? It can’t buy you much on its own, but it can make a world of difference when you’re handling...
Our second annual data breach preparedness study,Is Your Company Ready for a Big Breach?, conducted by the Ponemon Institute, reveals good news and bad...
Data breach notification letters serve multiple purposes. They ensure a breached company is compliant with data breach notification laws, they alert consumers to the...
When a data breach occurs, laws and industry regulations, dictate when and if you need to notify consumers whose data might have been compromised....
An employee who never uses a mobile device – personal or company-supplied – for business purposes is becoming a rare creature, indeed. Use of...
The purpose of any type of insurance is to protect your most valuable assets. To combat the prevalence of cyber attacks anddata breaches, an...
Outsourcing can be risky business. The Ponemon Institute reports that 65% of companies who outsourced work to a vendor have had adata breachinvolving consumer...
In today’s data driven world, information is king. So if you are not armed with the same information as your competitor or worse, experience...
While technology undoubtedly has made accessing medical information much easier and faster, it also has also provided an increased potential formedical data breachesespecially as...
Within the world of cyber security, a great deal of attention has been focused lately on the escalating hazards and frequency of data breaches,...
Our guest blogger this week is Tom Bowers, Managing Director,Security Constructs LLC–a security architecture, data leakage prevention and global enterprise information consulting firm. The...
It seems as though every day the news headlines trumpet another high-profile data breach. The most recent marquee breach is courtesy of a Sony...