What can proactive employers in controversial, targeted industries do to help protect their workforce from the ballooning risk of terrorist threats/attacks? The number, frequency and intensity of attacks on workers… Continue reading External Data Hygiene is a Literal Lifesaver for Targeted Industries
Industry: Government
Industrial & Corporate Espionage – New Variants of an Old Problem and How to Protect Your IP
Industrial and corporate espionage is not a new problem. Theft of intellectual property by corporate competitors and hostile foreign governments has gone on for centuries. However, the methodologies have advanced… Continue reading Industrial & Corporate Espionage – New Variants of an Old Problem and How to Protect Your IP
Cost Benefit Analysis Proves the Necessity of Business Privacy Management
Budget Conscious Investments to Maximize Risk Mitigation for SMBs In a series of recent white papers and resources, Privacy Bee clarifies the difference between traditional and emerging information security practices.… Continue reading Cost Benefit Analysis Proves the Necessity of Business Privacy Management
Managing Employee PII in the Technology Sector
Executive Takeaways With modern threats leveraging exposed employee PII, businesses must prioritize the security of their employees’ personally identifiable information (PII). In addition to deploying solutions to safeguard prized internal information,… Continue reading Managing Employee PII in the Technology Sector
Where Data Privacy and Cybersecurity Intersect (and Don’t)
A significant evolution is altering the way all organizations must regard the security of information systems. Many are not yet fully aware of it. At the core of this evolution… Continue reading Where Data Privacy and Cybersecurity Intersect (and Don’t)
Spear Phishing Attacks: Types, Elements, and Detection
Spear phishing is a highly-targeted, increasingly sophisticated attack that uses a combination of personally identifiable information (PII) and social engineering tactics to steal an organization’s money or data. Saying that… Continue reading Spear Phishing Attacks: Types, Elements, and Detection
Facts About Data Breaches and the Mid-Market
Budget Conscious Solutions for Protecting Mid-Market Companies One size does not fit all when it comes to defending companies against data breaches. The threat of cyber crime and the consequences… Continue reading Facts About Data Breaches and the Mid-Market
Business Email Compromise: Anatomy, Types, and Impact
Executive Takeaways An Overview of BEC Business Email Compromise (BEC) is a type of cyberattack that has grown in popularity recently, with attackers targeting businesses and organizations to steal money… Continue reading Business Email Compromise: Anatomy, Types, and Impact
Doxxing, Swatting and Other Physical Threats – An Online Privacy Epidemic
Cyber crime isn’t automatically associated with violent criminal activity. That is, when we think of cyber criminal activity, we tend to think of hackers working anonymously behind computer screens to… Continue reading Doxxing, Swatting and Other Physical Threats – An Online Privacy Epidemic
The Executive’s Guide to Social Engineering and Spear Phishing
Executive Takeaways What is Social Engineering? Social engineering tricks people into doing something using manipulation. In the context of attacks on organizations, it is employed to gain access to sensitive information,… Continue reading The Executive’s Guide to Social Engineering and Spear Phishing