CIOs are coming to terms with the realization that even their most robust cybersecurity functions are not effectively addressing unsecured external data privacy. The social engineering attack surface represents a… Continue reading Adding External Data Privacy Protection to Cybersecurity – Buy or Build?
Privacy Threat: Identity Theft
Privacy Management (EDP) is a Three-Legged Stool and It’s Up to Us
When it comes to protecting our external data privacy from the prying eyes and greedy hands of hackers, cyber criminals and threat actors of all kinds, no one is coming… Continue reading Privacy Management (EDP) is a Three-Legged Stool and It’s Up to Us
Who Guards the Guards? The Scourge of Data Broker Breaches and How to Stop Them
The first century Roman poet satirist, Juvenal (c.55 – 127 AD) is credited with first uttering the famous phrase “Quis custodiet ipsos custodes”. It can be translated as “Who guards… Continue reading Who Guards the Guards? The Scourge of Data Broker Breaches and How to Stop Them
Privacy Bee as a Superior Post-Breach Remedy
The Identity Theft Resource Center (ITRC) reports the number of data breaches occurring in the first half of 2024 (roughly 1.1 billion incidents) marks a 490% increase compared to the… Continue reading Privacy Bee as a Superior Post-Breach Remedy
Unsecured External Data is for Spammers and Scammers
On the subject of spam, Privacy Bee CEO, Harry Maugans often says, “Telemarketers don’t just pick up the phone and dial random numbers. They buy targeted lists from Data Brokers,… Continue reading Unsecured External Data is for Spammers and Scammers
Why “Active” External Data Privacy Mitigation Post-Breach is Superior to “Passive” Credit Monitoring
Question: What’s worse than having to inform your customers, investors, and business partners that their sensitive data has been compromised due to a data breach you were seemingly unable to… Continue reading Why “Active” External Data Privacy Mitigation Post-Breach is Superior to “Passive” Credit Monitoring
MOVEit Attack – A Postmortem Through the Prism of External Data Privacy Management
One business organization was breached – more than TWENTY-FIVE HUNDRED (and counting) organizations have been compromised according to TechCrunch as of December 2023 – many received this heart-stopping message: Hello,… Continue reading MOVEit Attack – A Postmortem Through the Prism of External Data Privacy Management
Calculating the ROI into External Data Privacy Management Solutions
External data privacy management is a preventative activity focused on preempting data breaches and other damaging consequences of unsecured external data. For preventative solutions – those that don’t yield a… Continue reading Calculating the ROI into External Data Privacy Management Solutions
How any Organization Looks in the Eyes of a Hacker – How to Avoid Being Seen as a Target
Scammers, particularly cyber thieves, make their living by finding the easiest ways to separate marks from their money. That is, this type of criminal doesn’t want to work too hard. … Continue reading How any Organization Looks in the Eyes of a Hacker – How to Avoid Being Seen as a Target
Your Privacy Risk Score: What Is It and How is it Calculated?
What is your organization’s privacy risk score? Do you know? How about the privacy risk scores of each employee and vendor/partner associated with your organization? Do you have that information… Continue reading Your Privacy Risk Score: What Is It and How is it Calculated?
