This postmortem document examines one of the more high-profile cybersecurity breaches of the last several years – the series of data breaches perpetrated against popular ride-sharing application and service, Uber. … Continue reading Uber’s 2022/23 Data Breaches – A Postmortem Through the Prism of External Data Privacy Management
Privacy Threat: Spear Phishing
Solar Winds Attack – A Postmortem Through The Prism Of External Data Privacy Management
This postmortem document examines one of the most significant cybersecurity breaches of the 21st century – the SolarWinds Cyberattack – and deconstructs the vulnerabilities and failures enabling its success. Part… Continue reading Solar Winds Attack – A Postmortem Through The Prism Of External Data Privacy Management
Guide to Japan’s Act on the Protection of Personal Information (APPI)
In this guide: Key facets of the Act on the Protection of Personal Information (APPI) Japan created the Act on the Protection of Personal Information (APPI) in 2003 as a… Continue reading Guide to Japan’s Act on the Protection of Personal Information (APPI)
How any Organization Looks in the Eyes of a Hacker – How to Avoid Being Seen as a Target
Scammers, particularly cyber thieves, make their living by finding the easiest ways to separate marks from their money. That is, this type of criminal doesn’t want to work too hard. … Continue reading How any Organization Looks in the Eyes of a Hacker – How to Avoid Being Seen as a Target
Converting Cookie Consent from an Expense to a Profit Center
There is growing awareness and alarm among consumers surrounding data privacy threats facing individuals and organizations. For individuals, instances of identity theft, phishing scams and the whole host of other… Continue reading Converting Cookie Consent from an Expense to a Profit Center
Your Privacy Risk Score: What Is It and How is it Calculated?
What is your organization’s privacy risk score? Do you know? How about the privacy risk scores of each employee and vendor/partner associated with your organization? Do you have that information… Continue reading Your Privacy Risk Score: What Is It and How is it Calculated?
Case Study: REIT Improves Occupancy and Retention with Privacy Management as Incentive
Challenge Solution Benefits CUSTOMER: A well-established Equity REIT managing a portfolio of investment properties across 5 southern US states. Their portfolio is comprised of affordable, multi-family housing properties valued at… Continue reading Case Study: REIT Improves Occupancy and Retention with Privacy Management as Incentive
How to Stop Data Brokers? Continuity is Critical
“If you delete it, it’s gone forever!” – CISOs who have not succeeded at eliminating unsecured external data This is potentially the most dangerous misconception any CIO or CISO can… Continue reading How to Stop Data Brokers? Continuity is Critical
External Data Privacy Metrics and KPIs – A How to Guide for Strong Compliance
Information security, cyber security and the latest iteration, external data security are critical to the health and viability of any organization. Companies of all sizes and types routinely invest significant… Continue reading External Data Privacy Metrics and KPIs – A How to Guide for Strong Compliance
Case Study: Finance Company Reverses Sales Slump by Promoting External Data Privacy Mgt. Practices
Customer: National Registered Investment Advisory (RIA) Firm with offices in 20 US states and over $95 billion under management Challenge: Solution: Results: Challenge: During a year-over-year analysis of new account… Continue reading Case Study: Finance Company Reverses Sales Slump by Promoting External Data Privacy Mgt. Practices