Security Recommendations for Technology Businesses with Retail Clients
Earlier this week, SafeNet, a data asset security firm, published a report detailing the breakdown of 2013 data breaches by industry. The report revealed that data breaches affect various industries in...
View ArticleBeyond Data Breaches: How Unplanned Outages Can Cost You
A recent story on FierceHealthIT.com reported that many healthcare providers are unprepared for IT outages, which cost an average of $400,000 per incident. Despite the devastating cost, more than 80...
View ArticleAnd Another One: Congress Proposes One More Data Breach Bill
A BankInfoSecurity article reports that Senator Jay D. Rockefeller (D – WV) submitted another data breach law in the Senate: the Data Security and Breach Notification Act of 2014. Add it to the list of...
View ArticleEnd of XP Support from Microsoft Could Affect Retailers
According to a report by NetworkWorld, most point-of-sale systems rely on a scaled-down version of Windows XP, which means retailers could be in trouble when Microsoft stops supporting the OS this...
View ArticleWearable Wallets = Losable, Hackable Wallets
IT professionals tend to hear conflicting stories when it comes to mobile wallets and digital currencies. Proponents talk about simple, easy transactions, while skeptics point out the numerous security...
View ArticleIs Your Refrigerator Running Malware?
NBC News reports that in six years there will be more than 30 billion internet-enabled devices, a huge increase from current levels. More and more products, from your refrigerator to your car to your...
View ArticleProposed Bill Would Mandate Smartphone Kill Switches to Fight Data Breaches
Four senators have proposed a bill that would require smartphone makers to include a "kill switch" to allow consumers to shut off phones and lock them after they're stolen. According to CNET, The...
View ArticleA Cure for Data Breaches?
In the last week, mobile phone companies have announced new products and features designed especially to enhance mobile data security. Here's what we've seen from some of the industry's heavy...
View ArticleYour Client Wants One of These Fancy New Domain Extensions. Here's What to...
In a recent post on Intuit.com, bloggers highlighted some of the benefits of new domain name classes created by ICANN (Internet Corporation for Assigned Names and Numbers).A domain name class is what...
View ArticleThe Face of E&O for Data Miners
Data mining and business intelligence firms face numerous professional liabilities. As data experts, you can be asked to forecast sales and build business plans to fit the demographics and purchasing...
View ArticleHow to Talk Apps to Clients Business News Daily
Business News Daily raises an important point for mobile app developers: your clients may want a "mobile presence,” but have no idea what that means.Indeed, all IT professionals face this fundamental...
View ArticleBlack to the Future: Better Security from the Next Class of Smart Phones?
In recent days, we've seen a slew of new mobile devices and apps designed to prevent data breaches. Last week's RSA conference in San Francisco provided developers, engineers, and tech companies a...
View ArticleIs It Time to Go Looking for Data Breaches?
Stop me if you've heard this one: a major U.S. retailer was hit with a massive data breach. It sounds familiar because it is. But this time, we're not talking about Target. We're actually talking about...
View ArticleMake Your Clients Safer: A Lesson in Email
According to a PressTV report, a recent study by HALOCK Security Labs revealed that email security problems are surprisingly common in the financial industry. More than 70 percent of mortgage lenders...
View ArticleTech Firms Announce They’re Doing Risky Business
The Wall Street Journal's MarketWatch reported this month on an incredible discrepancy between tech firms and other industries. Tech vendors and IT companies see their work as risky and susceptible to...
View ArticleHelp Your Clients Understand the Risks from Third-Party Contractors
Your clients might use third-party vendors to outsource their payroll, HR, IT infrastructure, and all sorts of essential small-business functions. Unfortunately, as Business News Daily reports, this...
View ArticleWhat the Target CIO’s Resignation Reveals about Business Psychology
The Huffington Post reports that Target Corporation's Chief Information Officer, Beth Jacob, has resigned from her position as the company looks to regroup after the largest data breach in U.S....
View ArticleThe Million-Dollar Client Conversation
Wouldn't it be great if there were a simple way to reduce the likelihood and cost of a data breach? Well, there is. Simply having a conversation can fix many of the misconceptions employees and clients...
View ArticleWhen a Client’s Data Breach Is Good News
In a bizarre twist of fate, the company that makes Target's security software saw its stock price jump after the data breach. How did this happen?In order to understand why the Target data breach is...
View ArticleWhat IT Businesses Need to Know about the Future of Identity Theft, Data...
While you might assume that the Target data breach was caused by a coordinated and sophisticated malware attack, the truth is much more frightening.SecurityWeek.com profiles MacAfee's investigation of...
View Article