- March 9th, 2017
With news breaking on the CIA’s ability to listen in via Smart TVs, many will be alarmed by the breadth of the exploits WikiLeaks has uncovered. The security industry has been warning of the dangers of Internet of Things devices for a long time and just last week, a hack on internet-connected teddy bears was making the headlines.
- September 23rd, 2016
Following the Yahoo breach many users are concerned about their online safety and what to do next. As with all data breaches although a lot of the issues are beyond the control of the user there are some straightforward measures that they can take to be as safe as possible online.
- December 17th, 2015
2015 has often been referred to as the year of the breach, with high profile attacks affecting global organizations in huge numbers. It was the year data breaches got personal with high profile attacks compromising almost every aspect of user’s lives.
- December 11th, 2015
In my last blog, I looked at examples of the commercial impact on a company in the instance of a data breach.
The correct method of dealing with a data breach contains many actions including containment, employee engagement and making sure it never happens again, but part of your plan should include planning how to get your message out there and let your investors and customers know what the latest status is.
- December 2nd, 2015