What can proactive employers in controversial, targeted industries do to help protect their workforce from the ballooning risk of terrorist threats/attacks? The number, frequency and intensity of attacks on workers… Continue reading External Data Hygiene is a Literal Lifesaver for Targeted Industries
Content Type: Articles
The Rapid Growth of AI-Powered Social Engineering Attacks
Ferris Bueller famously said, “Life moves pretty fast. If you don’t stop to look around once in a while, you could miss it.” CISOs, CIOs and other IT leaders grappling… Continue reading The Rapid Growth of AI-Powered Social Engineering Attacks
Managing Employee PII in the Technology Sector
Executive Takeaways With modern threats leveraging exposed employee PII, businesses must prioritize the security of their employees’ personally identifiable information (PII). In addition to deploying solutions to safeguard prized internal information,… Continue reading Managing Employee PII in the Technology Sector
Cybersecurity “Fails” to Address PII Exposure
Executive Takeaways Have you ever wondered why the number of cyberattacks continues to increase, despite the vast sums spent on cybersecurity? PII exposure is at least partly responsible. Cybersecurity has… Continue reading Cybersecurity “Fails” to Address PII Exposure
Enterprise Use Cases for External Data Privacy: Part II
Welcome to the second part of our Enterprise Use Cases for External Data Privacy article series. In part one, we discussed the importance of External Data Privacy (EDP) and explored… Continue reading Enterprise Use Cases for External Data Privacy: Part II
Enterprise Use Cases for External Data Privacy: Part I
Executive Takeaways The effects of a laissez-faire attitude toward personal information have become all too apparent. External Data Privacy (EDP) has become an essential business service as a result. Consider:… Continue reading Enterprise Use Cases for External Data Privacy: Part I
Spear Phishing Attacks: Types, Elements, and Detection
Spear phishing is a highly-targeted, increasingly sophisticated attack that uses a combination of personally identifiable information (PII) and social engineering tactics to steal an organization’s money or data. Saying that… Continue reading Spear Phishing Attacks: Types, Elements, and Detection
Business Email Compromise: Anatomy, Types, and Impact
Executive Takeaways An Overview of BEC Business Email Compromise (BEC) is a type of cyberattack that has grown in popularity recently, with attackers targeting businesses and organizations to steal money… Continue reading Business Email Compromise: Anatomy, Types, and Impact
Expanding Doxing Risks & The Need for Privacy as a Service
In an increasingly political and divisive climate, doxing is a growing threat. It threatens, in particular, any person with increased exposure to sensitive and extremist groups online. These at-risk groups,… Continue reading Expanding Doxing Risks & The Need for Privacy as a Service
The Competitive Advantages of Employee Data Privacy
Executive Takeaways The Competitive Advantage of Prioritizing Data Privacy Exposed employee Personally Identifiable Information (PII) has led to more social engineering and spear phishing attacks on organizations. As such, organizations… Continue reading The Competitive Advantages of Employee Data Privacy