Data Breach – Who’s Gonna Get It?
Ford Pinto (Photo credit: Wikipedia) The message–that’s what I’m talking about–who’s gonna get the message sent to them first? UPDATE: Global Payments Inc. April 2012 Data Breach Costs $94 MILLION!...
View ArticleTexas’ Amended Data Breach Notification Law
Texas amended its existing data breach notification law which became effective on September 1, 2012. The relevant section of the law is titled “Notification Required Following Breach of Security of...
View ArticleSo, your business has never had a data breach? Have you ever had an employee...
TAKEAWAY: Businesses must protect their data from being taken by anyone who is not authorized to have it — insiders and outsiders alike. If their data is taken in a way that is unauthorized, it is a...
View ArticleBreach Notifications Should Focus On Preserving The Customer Relationship...
Hit or Miss? When responding to a data breach, the company has two primary objectives that must be balanced: (1) complying with the legal notification and remediation requirements; and (2) preserving...
View ArticleTwo Step Data Breach Risk Test for Texas Businesses
What is a data breach under Texas law? Hint: it doesn’t take much! Does your business have this digital information about other people? 1. last name + first name or first initial + social security...
View ArticleGov’t Contractors Must Notify of Data Breach Within 3 days
If your business is a contractor for the federal government, you had better have your data breach response ducks in a row. The moment you detect a breach, the clock starts ticking and you have only 3...
View ArticlePublix hasn’t had a data breach but is already seeking PR help in case it...
This is interesting. Publix grocery store chain has made the news because of data breach — not because they have had a data breach (though they probably have and just don’t know it) — but because it...
View ArticleThe Public Relations Side of a Data Breach | Platform Magazine
Thank you to Platform Magazine for quoting me discussing the PR component of CyberGard in this forward thinking article about the value of getting public relations on board before your company has a...
View ArticleUpdate/Clarification: Washington AG Seeks Data Breach Law That Ends Blanket...
This update/clarification post explains how the proposed Washington state data breach notification law is really treating encrypted data and how it may actually be expanding the data breach safe harbor...
View ArticleHappy Data Privacy Day!
What are you doing to observe it? Today is Data Privacy Day! If you have been wondering “what is Data Privacy Day?” then this is your lucky day because not only is today Data Privacy Day, but here is...
View ArticleExecutives & Board: The conversation security leaders need to have about Amy...
This is an excellent article that covers a very important topic you need to consider. You — as in Executives and Board Members of Companies all around the world. Stop, close your eyes, and ask yourself...
View ArticleCybersecurity Presentation at ACFE 25th Annual DFW Fraud Conference
I am really looking forward to speaking to the 400+ attendees at the Association of Certified Fraud Examiners’ (ACFE) 25th Annual DFW Fraud Conference event on Friday, May 15, 2015. My address is...
View ArticlePresentation tomorrow – Collin County Bar Ass’n Corporate Counsel Section –...
“What do I talk about?” No, it’s not that I don’t have anything to say — for goodness sakes, you all know that I always have something to say! The problem I am having is that I had planned to talk...
View ArticleCybersecurity & Data Breach: You Don’t Drown From Falling Into the Water
“You don’t drown from falling into the water, you drown from not getting out.” Think about that — and think about how that applies to cyber security and data breach issues facing companies in today’s...
View ArticleWhy every CIO needs a cybersecurity attorney (my comments on why this is my...
Wow, this article seriously just made my day. I will apologize in advance to my friend and CSO writer and Michael Santarcangelo (@catalyst), but this may very well be my favorite article — anywhere —...
View ArticleEmployee Viewing Information Without Authorization Triggers Data Breach...
An employee of Golden State Credit Union viewed member account information, containing Personally Identifiable Information (PII), without having the requisite authority to view such accounts. This...
View ArticleEmployee Retaining Stored Patient List on Personal Laptop Triggers Data...
An employee of East Bay Perinatal Medical Associates in Oakland, CA, retained on his personal laptop, a patient list that he had prepared as part of his job. The list did not contain PHI information...
View ArticleIs your business prepared to respond this quickly to a data breach?
Customers and the public expect a very quick response to a data breach — within a matter of a few days. That is the new standard. If your business is not prepared ahead of time for such a response, it...
View ArticleCover the Basics for Securing Your Network — Shawn Tuma’s Book Contribution
Shawn Tuma authored a section for an eBook published by Fortinet Security. You can read Tuma’s section, Cover the Basics, as well as download the complete eBook at this link: Cover the Basics- by Shawn...
View ArticleSecureWorld Webinar: Data Protection Pitfalls to Avoid
You are welcome to attend a complimentary SecureWorld webinar with these featured presenters: Aliki Liadis-Hall, Director of Compliance, North American Bancard Jason Hart, CTO of Data Protection,...
View Article
More Pages to Explore .....