A significant evolution is altering the way all organizations must regard the security of information systems. Many are not yet fully aware of it. At the core of this evolution… Continue reading Where Data Privacy and Cybersecurity Intersect (and Don’t)
Industry: High Tech
Enterprise Use Cases for External Data Privacy: Part I
Executive Takeaways The effects of a laissez-faire attitude toward personal information have become all too apparent. External Data Privacy (EDP) has become an essential business service as a result. Consider:… Continue reading Enterprise Use Cases for External Data Privacy: Part I
Spear Phishing Attacks: Types, Elements, and Detection
Spear phishing is a highly-targeted, increasingly sophisticated attack that uses a combination of personally identifiable information (PII) and social engineering tactics to steal an organization’s money or data. Saying that… Continue reading Spear Phishing Attacks: Types, Elements, and Detection
Facts About Data Breaches and the Mid-Market
Budget Conscious Solutions for Protecting Mid-Market Companies One size does not fit all when it comes to defending companies against data breaches. The threat of cyber crime and the consequences… Continue reading Facts About Data Breaches and the Mid-Market
Business Email Compromise: Anatomy, Types, and Impact
Executive Takeaways An Overview of BEC Business Email Compromise (BEC) is a type of cyberattack that has grown in popularity recently, with attackers targeting businesses and organizations to steal money… Continue reading Business Email Compromise: Anatomy, Types, and Impact
The Competitive Advantages of Employee Data Privacy
Executive Takeaways The Competitive Advantage of Prioritizing Data Privacy Exposed employee Personally Identifiable Information (PII) has led to more social engineering and spear phishing attacks on organizations. As such, organizations… Continue reading The Competitive Advantages of Employee Data Privacy
External PII Exposure Fuels Social Engineering, Data Breaches
Executive Takeaways Employee PII: An Easy-to-access, Effective Attack Vector External employee Personally Identifiable Information (PII) is a highly effective attack vector easily accessible to attackers. This PII is often used… Continue reading External PII Exposure Fuels Social Engineering, Data Breaches
Employee Poaching, Churn and External Data Privacy – How to Mount an Innovative Poaching Defense
For some industries like High Tech/IT and Medical/Nursing, a talent shortage existed long before COVID. For these fields, employee poaching and HR churn have long been a challenge. Today though,… Continue reading Employee Poaching, Churn and External Data Privacy – How to Mount an Innovative Poaching Defense
The Executive’s Guide to Social Engineering and Spear Phishing
Executive Takeaways What is Social Engineering? Social engineering tricks people into doing something using manipulation. In the context of attacks on organizations, it is employed to gain access to sensitive information,… Continue reading The Executive’s Guide to Social Engineering and Spear Phishing
Guide to Complying with Looming Procurement Requirements for Privacy Risk
Getting Ahead of the Next Critical Privacy Risk Requirement for Winning Lucrative Business Contracts Competition has always been stiff to win lucrative contracts. Especially with large corporate entities, businesses, private… Continue reading Guide to Complying with Looming Procurement Requirements for Privacy Risk