Will Home Depot be the one that’s “gonna get it”? Based upon the information we are learning, it could be. Way back in 2011 I wrote Data Breach — Who’s Gonna Get it? and it scared people. For good reason. In that piece I wrote of how one day, in the future, a company would come along that…
Tag: Information security
3 Steps the C-Suite Can Take to Strengthen Cyber Security
The C-Suite is ultimately responsible for failures of a company’s cyber security. A recent example of this is how Target’s CEO, CTO, and several Board Members were pushed out in the wake of its data breach. SEE BELOW FOR EVENT REGISTRATION! This puts leaders in a difficult position. It is almost a statistical certainty that…
3 Important Questions the State Attorneys General Will Ask Your Company Following A Data Breach
In an earlier blog post I wrote about how [w]hen your company has a data breach, these are the top 3 questions that you will be required to answer: How did the breach happen? What steps did your company take before the breach to protect the data and keep it from happening? What steps is…
Two Step Data Breach Risk Test for Texas Businesses
Does your business have this digital information about other people? 1. last name + first name or first initial + social security number, driver’s license number, or other government issued identification, or account or card numbers + access codes, or 2. information that identifies an individual + concerns a health condition or healthcare If you answered…
The #1 Thing the C-Suite Can Learn from Target’s CEO’s Resignation
Data security is such a threat to businesses that it must be a key tenet of leadership for the C-Suite and the Boardroom. Over the last several years I have written and spoken extensively about the risks that businesses face from the threat of data breaches. (posts) One of the points I try to make is that…
Corporate Espionage: Hacking A Company Through A Chinese Restaurant Takeout Menu
Corporate espionage (industrial espionage) is a favorite topic of mine. I have written and presented on the subject quite a bit and, while I am never sure how my readers react when I write about this, I do carefully watch the look on my audience members’ faces when I first mention the issue. The story…
3 Important Questions Your Company Must Answer After A Data Breach
Riddle: What has sensitive data, is the target of cyber criminals, and will (almost certainly) have a data breach? Answer: YOUR COMPANY! When your company has a data breach, these are the top 3 questions that you will be required to answer: How did the breach happen? What steps did your company take before the breach…
Is Your Business Following the 3 Steps the FTC is Requiring for Using Data Service Providers?
The Federal Trade Commission now requires businesses to take the following 3 steps when contracting with data service providers: Investigate. Obligate. Verify. Is your business following these steps? Investigate. Businesses are required to investigate by exercising due diligence before hiring data service providers. Obligate. Businesses are required to obligate their data service providers to adhere…
The Indispensability of Cyber Counterintelligence
You already know what a threat hacking and data breaches are to your business, right? Good. In that case, you will appreciate the following post from my friends at SpearTip about cyber counterintelligence. Here’s a little teaser: If your organization is not yet retaining a provider that specializes in this technique, referred to as “Cyber…
Here is an excellent article by my friend and infosecurity expert Allan Pratt explaining how employers can help reduce the risk of having employees telecommute. I trust you will find this very informative.
You must be logged in to post a comment.