Scammers, particularly cyber thieves, make their living by finding the easiest ways to separate marks from their money. That is, this type of criminal doesn’t want to work too hard. … Continue reading How any Organization Looks in the Eyes of a Hacker – How to Avoid Being Seen as a Target
Industry: Political Organizations
Your Privacy Risk Score: What Is It and How is it Calculated?
What is your organization’s privacy risk score? Do you know? How about the privacy risk scores of each employee and vendor/partner associated with your organization? Do you have that information… Continue reading Your Privacy Risk Score: What Is It and How is it Calculated?
How to Stop Data Brokers? Continuity is Critical
“If you delete it, it’s gone forever!” – CISOs who have not succeeded at eliminating unsecured external data This is potentially the most dangerous misconception any CIO or CISO can… Continue reading How to Stop Data Brokers? Continuity is Critical
Case Study: Reduction in Physical Threats Against Public Health Agency Workforce
Customer: Government Public Health Organization Challenge: Solution: Results: Challenge: The workforce of a government agency responsible for developing and distributing vaccines for COVID-19 and other public health threats – and… Continue reading Case Study: Reduction in Physical Threats Against Public Health Agency Workforce
Executive Security – In Data Privacy Chess, King and Pawn are Equal
CEOs, other top executives and their families are increasingly the target of violent physical attacks as ideological extremism is on the rise. They’re also a prime target for cyber attacks… Continue reading Executive Security – In Data Privacy Chess, King and Pawn are Equal
External Data Privacy Metrics and KPIs – A How to Guide for Strong Compliance
Information security, cyber security and the latest iteration, external data security are critical to the health and viability of any organization. Companies of all sizes and types routinely invest significant… Continue reading External Data Privacy Metrics and KPIs – A How to Guide for Strong Compliance
External Data Hygiene is a Literal Lifesaver for Targeted Industries
What can proactive employers in controversial, targeted industries do to help protect their workforce from the ballooning risk of terrorist threats/attacks? The number, frequency and intensity of attacks on workers… Continue reading External Data Hygiene is a Literal Lifesaver for Targeted Industries
The Rapid Growth of AI-Powered Social Engineering Attacks
Ferris Bueller famously said, “Life moves pretty fast. If you don’t stop to look around once in a while, you could miss it.” CISOs, CIOs and other IT leaders grappling… Continue reading The Rapid Growth of AI-Powered Social Engineering Attacks
Industrial & Corporate Espionage – New Variants of an Old Problem and How to Protect Your IP
Industrial and corporate espionage is not a new problem. Theft of intellectual property by corporate competitors and hostile foreign governments has gone on for centuries. However, the methodologies have advanced… Continue reading Industrial & Corporate Espionage – New Variants of an Old Problem and How to Protect Your IP
Where Data Privacy and Cybersecurity Intersect (and Don’t)
A significant evolution is altering the way all organizations must regard the security of information systems. Many are not yet fully aware of it. At the core of this evolution… Continue reading Where Data Privacy and Cybersecurity Intersect (and Don’t)