Executive Takeaways Employee PII: An Easy-to-access, Effective Attack Vector External employee Personally Identifiable Information (PII) is a highly effective attack vector easily accessible to attackers. This PII is often used… Continue reading External PII Exposure Fuels Social Engineering, Data Breaches
Industry: Consumer Goods
Guide to Complying with Looming Procurement Requirements for Privacy Risk
Getting Ahead of the Next Critical Privacy Risk Requirement for Winning Lucrative Business Contracts Competition has always been stiff to win lucrative contracts. Especially with large corporate entities, businesses, private… Continue reading Guide to Complying with Looming Procurement Requirements for Privacy Risk
Optimizing Vendor Risk Management with External Data Privacy
Executive Takeaways Organizations are increasingly reliant on third-party vendors to supplement or complement operations. This increasing reliance expands organizational threat surfaces, as vendors require access to sensitive employee and customer… Continue reading Optimizing Vendor Risk Management with External Data Privacy
Exposing the Threat to Data Privacy Posed by Data Brokers & People Search Sites
American consumers are becoming more aware of the dangers inherent in allowing their personal data to be collected and manipulated, unmanaged by Data Brokers and People Search Sites online. Most… Continue reading Exposing the Threat to Data Privacy Posed by Data Brokers & People Search Sites
Mitigating Exposed PII Dramatically Lowers Risk of Data Breach via Social Engineering
Chief Information Security Officers can dramatically improve the efficacy of their efforts to interrupt costly and disruptive social engineering attacks on their organizations by addressing the root cause of these… Continue reading Mitigating Exposed PII Dramatically Lowers Risk of Data Breach via Social Engineering
External Data Security and Vendor Risk
The Case for External Data Privacy (EDP) Controls for Organizations and their Affiliates/Partners Leading information security professionals at organizations of all sizes, both public and private, may be operating with… Continue reading External Data Security and Vendor Risk
External Data Privacy Vs. Identity Theft Protection
For threat actors, access to employee or corporate data enables social engineering (including spear phishing) and other cybercrimes. This illicit access can lead to identity or IP theft, stolen money,… Continue reading External Data Privacy Vs. Identity Theft Protection