CIOs are coming to terms with the realization that even their most robust cybersecurity functions are not effectively addressing unsecured external data privacy. The social engineering attack surface represents a… Continue reading Adding External Data Privacy Protection to Cybersecurity – Buy or Build?
Privacy Threat: Physical Threats
The Double Edge Sword of OSINT in Cybersecurity
Open-Source Intelligence or “OSINT” is a powerful weapon in the arsenal of actions organizations can employ to bolster their cyber security efficacy. And, because it is one of the more… Continue reading The Double Edge Sword of OSINT in Cybersecurity
Privacy Management (EDP) is a Three-Legged Stool and It’s Up to Us
When it comes to protecting our external data privacy from the prying eyes and greedy hands of hackers, cyber criminals and threat actors of all kinds, no one is coming… Continue reading Privacy Management (EDP) is a Three-Legged Stool and It’s Up to Us
Who Guards the Guards? The Scourge of Data Broker Breaches and How to Stop Them
The first century Roman poet satirist, Juvenal (c.55 – 127 AD) is credited with first uttering the famous phrase “Quis custodiet ipsos custodes”. It can be translated as “Who guards… Continue reading Who Guards the Guards? The Scourge of Data Broker Breaches and How to Stop Them
Unsecured External Data is for Spammers and Scammers
On the subject of spam, Privacy Bee CEO, Harry Maugans often says, “Telemarketers don’t just pick up the phone and dial random numbers. They buy targeted lists from Data Brokers,… Continue reading Unsecured External Data is for Spammers and Scammers
Hacktivism on the March – From Cyber Protest to Cyber Warfare
Since 2022 reports of “hacktivism” have been spiking marking a notable resurgence in this type of attack. The reemergence of hacktivism is largely driven by the Russia-Ukraine conflict and the… Continue reading Hacktivism on the March – From Cyber Protest to Cyber Warfare
Why “Active” External Data Privacy Mitigation Post-Breach is Superior to “Passive” Credit Monitoring
Question: What’s worse than having to inform your customers, investors, and business partners that their sensitive data has been compromised due to a data breach you were seemingly unable to… Continue reading Why “Active” External Data Privacy Mitigation Post-Breach is Superior to “Passive” Credit Monitoring
Georgia Provides an Object Lesson on Why Governments Are the Problem and Solution to Managing Privacy Threats
The Peach State is our home. Headquartered here in the Atlanta Metro Area, Privacy Bee is proudly leading the charge when it comes to protecting the privacy of all Americans. … Continue reading Georgia Provides an Object Lesson on Why Governments Are the Problem and Solution to Managing Privacy Threats
Case Study: Addiction Counseling and Rehab Centers Protect Against Violent Attacks and Improve Recruitment/Retention
Customer: An addiction counseling and drug rehabilitation provider Challenge: Solution: Results: Customer: An addiction counseling and drug rehabilitation provider with more than a two-dozen clinics operating across the American south… Continue reading Case Study: Addiction Counseling and Rehab Centers Protect Against Violent Attacks and Improve Recruitment/Retention
Case Study: Casino Operator Protects Against Threats of Retaliation and More
Challenge: Solution Results Customer: A Popular Casino & Hotel Operator with Properties in the US and Macau Challenge: For decades, the threat of retaliation against casinos by disgruntled gamers who’ve lost… Continue reading Case Study: Casino Operator Protects Against Threats of Retaliation and More
