Executive Takeaways: What is PII Exposure? Personally Identifiable Information (PII) exposure is the accidental or unauthorized release of PII. PII is any information attackers can use to identify a person,… Continue reading Safeguarding Enterprises from PII Exposure Risks and Threats
role: CISO & CIO
Organizational Defense Strategies (Spear Phishing)
Spear Phishing is one of the most fundamental threats to the security of organizations today. As we’ve discussed before, this is largely because of the nature of the Spear Phishing… Continue reading Organizational Defense Strategies (Spear Phishing)
What’s With All the Data Breaches?
There are several factors for the historic surge in data breaches. These include the proliferation of mobile devices, the amount of data transferred, more digital storage, and poor security measures… Continue reading What’s With All the Data Breaches?
Exposing the Threat to Data Privacy Posed by Data Brokers & People Search Sites
American consumers are becoming more aware of the dangers inherent in allowing their personal data to be collected and manipulated, unmanaged by Data Brokers and People Search Sites online. Most… Continue reading Exposing the Threat to Data Privacy Posed by Data Brokers & People Search Sites
What is Spear Phishing – and Why Does it Still Work?
A danger lurks inside your organization. It’s a looming, ever-present, and ever-growing threat to your business’s security. It is the bane of Cyber Security teams around the world. They curse… Continue reading What is Spear Phishing – and Why Does it Still Work?
Integrating Executives’ Cybersecurity with External Data Privacy
99% of executives’ PII is found within the databases of some of the most notorious Data Brokers. Executive Takeaways First, we must state in no unclear terms that cybersecurity is vital to… Continue reading Integrating Executives’ Cybersecurity with External Data Privacy
The Anatomy of Spear Phishing Attacks
While common email tools and cybersecurity firewalls are getting better at filtering out egregious of phishing attempts, highly-personalized and effective spear phishing attacks remain a threat. Today’s successful spear phishing… Continue reading The Anatomy of Spear Phishing Attacks
Mitigating Exposed PII Dramatically Lowers Risk of Data Breach via Social Engineering
Chief Information Security Officers can dramatically improve the efficacy of their efforts to interrupt costly and disruptive social engineering attacks on their organizations by addressing the root cause of these… Continue reading Mitigating Exposed PII Dramatically Lowers Risk of Data Breach via Social Engineering
External Data Security and Vendor Risk
The Case for External Data Privacy (EDP) Controls for Organizations and their Affiliates/Partners Leading information security professionals at organizations of all sizes, both public and private, may be operating with… Continue reading External Data Security and Vendor Risk
How to Mitigate Employee Poaching with External Data Privacy
Executive Takeaways The Growing Threat of Employee Poaching Organizations must learn how to mitigate employee poaching, the practice of actively recruiting employees from another organization. The means of poaching often… Continue reading How to Mitigate Employee Poaching with External Data Privacy