What can proactive employers in controversial, targeted industries do to help protect their workforce from the ballooning risk of terrorist threats/attacks? The number, frequency and intensity of attacks on workers… Continue reading External Data Hygiene is a Literal Lifesaver for Targeted Industries
Industry: Political Organizations
The Rapid Growth of AI-Powered Social Engineering Attacks
Ferris Bueller famously said, “Life moves pretty fast. If you don’t stop to look around once in a while, you could miss it.” CISOs, CIOs and other IT leaders grappling… Continue reading The Rapid Growth of AI-Powered Social Engineering Attacks
Industrial & Corporate Espionage – New Variants of an Old Problem and How to Protect Your IP
Industrial and corporate espionage is not a new problem. Theft of intellectual property by corporate competitors and hostile foreign governments has gone on for centuries. However, the methodologies have advanced… Continue reading Industrial & Corporate Espionage – New Variants of an Old Problem and How to Protect Your IP
Where Data Privacy and Cybersecurity Intersect (and Don’t)
A significant evolution is altering the way all organizations must regard the security of information systems. Many are not yet fully aware of it. At the core of this evolution… Continue reading Where Data Privacy and Cybersecurity Intersect (and Don’t)
Facts About Data Breaches and the Mid-Market
Budget Conscious Solutions for Protecting Mid-Market Companies One size does not fit all when it comes to defending companies against data breaches. The threat of cyber crime and the consequences… Continue reading Facts About Data Breaches and the Mid-Market
Doxxing, Swatting and Other Physical Threats – An Online Privacy Epidemic
Cyber crime isn’t automatically associated with violent criminal activity. That is, when we think of cyber criminal activity, we tend to think of hackers working anonymously behind computer screens to… Continue reading Doxxing, Swatting and Other Physical Threats – An Online Privacy Epidemic
Employee Poaching, Churn and External Data Privacy – How to Mount an Innovative Poaching Defense
For some industries like High Tech/IT and Medical/Nursing, a talent shortage existed long before COVID. For these fields, employee poaching and HR churn have long been a challenge. Today though,… Continue reading Employee Poaching, Churn and External Data Privacy – How to Mount an Innovative Poaching Defense
Guide to Complying with Looming Procurement Requirements for Privacy Risk
Getting Ahead of the Next Critical Privacy Risk Requirement for Winning Lucrative Business Contracts Competition has always been stiff to win lucrative contracts. Especially with large corporate entities, businesses, private… Continue reading Guide to Complying with Looming Procurement Requirements for Privacy Risk
Exposing the Threat to Data Privacy Posed by Data Brokers & People Search Sites
American consumers are becoming more aware of the dangers inherent in allowing their personal data to be collected and manipulated, unmanaged by Data Brokers and People Search Sites online. Most… Continue reading Exposing the Threat to Data Privacy Posed by Data Brokers & People Search Sites
Mitigating Exposed PII Dramatically Lowers Risk of Data Breach via Social Engineering
Chief Information Security Officers can dramatically improve the efficacy of their efforts to interrupt costly and disruptive social engineering attacks on their organizations by addressing the root cause of these… Continue reading Mitigating Exposed PII Dramatically Lowers Risk of Data Breach via Social Engineering