Scammers, particularly cyber thieves, make their living by finding the easiest ways to separate marks from their money. That is, this type of criminal doesn’t want to work too hard. … Continue reading How any Organization Looks in the Eyes of a Hacker – How to Avoid Being Seen as a Target
Industry: Communications
Your Privacy Risk Score: What Is It and How is it Calculated?
What is your organization’s privacy risk score? Do you know? How about the privacy risk scores of each employee and vendor/partner associated with your organization? Do you have that information… Continue reading Your Privacy Risk Score: What Is It and How is it Calculated?
How to Stop Data Brokers? Continuity is Critical
“If you delete it, it’s gone forever!” – CISOs who have not succeeded at eliminating unsecured external data This is potentially the most dangerous misconception any CIO or CISO can… Continue reading How to Stop Data Brokers? Continuity is Critical
External Data Privacy Metrics and KPIs – A How to Guide for Strong Compliance
Information security, cyber security and the latest iteration, external data security are critical to the health and viability of any organization. Companies of all sizes and types routinely invest significant… Continue reading External Data Privacy Metrics and KPIs – A How to Guide for Strong Compliance
Cyber Security Isn’t Enough – The Information Security Ecosystem Dies Without External Data Privacy
There’s an old joke among economists that goes, “Ask three economists about the state of the economy and you’ll get five answers.” Though it’s not a laughing matter, the same… Continue reading Cyber Security Isn’t Enough – The Information Security Ecosystem Dies Without External Data Privacy
Facts About Data Breaches and the Mid-Market
Budget Conscious Solutions for Protecting Mid-Market Companies One size does not fit all when it comes to defending companies against data breaches. The threat of cyber crime and the consequences… Continue reading Facts About Data Breaches and the Mid-Market
Employee Poaching, Churn and External Data Privacy – How to Mount an Innovative Poaching Defense
For some industries like High Tech/IT and Medical/Nursing, a talent shortage existed long before COVID. For these fields, employee poaching and HR churn have long been a challenge. Today though,… Continue reading Employee Poaching, Churn and External Data Privacy – How to Mount an Innovative Poaching Defense
Optimizing Vendor Risk Management with External Data Privacy
Executive Takeaways Organizations are increasingly reliant on third-party vendors to supplement or complement operations. This increasing reliance expands organizational threat surfaces, as vendors require access to sensitive employee and customer… Continue reading Optimizing Vendor Risk Management with External Data Privacy
Exposing the Threat to Data Privacy Posed by Data Brokers & People Search Sites
American consumers are becoming more aware of the dangers inherent in allowing their personal data to be collected and manipulated, unmanaged by Data Brokers and People Search Sites online. Most… Continue reading Exposing the Threat to Data Privacy Posed by Data Brokers & People Search Sites
Mitigating Exposed PII Dramatically Lowers Risk of Data Breach via Social Engineering
Chief Information Security Officers can dramatically improve the efficacy of their efforts to interrupt costly and disruptive social engineering attacks on their organizations by addressing the root cause of these… Continue reading Mitigating Exposed PII Dramatically Lowers Risk of Data Breach via Social Engineering