by Chuck Rutenberg | Oct 25, 2018 | Safeguarding Customer Data
By some estimates, consumers are more concerned about identity theft than the theft of their cars, wallets, purses, or cell phones. And with good reason: If your identity is stolen and the perpetrators open credit accounts in your name, it can take years to straighten...
by Chuck Rutenberg | Oct 23, 2018 | Cyber Threats
Spam. Even after all these years, no one has come up with a truly effective way to deal with it. There are filtering solutions, whitelisting, blacklisting, and other approaches, but somehow the spammers still find a way to get their messages across. And there seems to...
by Chuck Rutenberg | Oct 12, 2018 | Healthcare IT
Just a few months ago, provider UnityPoint Health suffered a phishing-related data breach that compromised the protected data of up to 1.4 million patients. The breach occurred between March 14th and April 3rd of 2018, when a high-level executive’s email account was...
by Chuck Rutenberg | Oct 4, 2018 | Cyber Threats
It may surprise you (depending on how proactive your business insurance rep is) to learn that some insurance companies have started writing policies that cover business losses resulting from cyberattacks. Cyber insurance covered losses vary from carrier to carrier and...
by Chuck Rutenberg | Oct 2, 2018 | Cyber Threats
Email interception attacks have been rising over the past few years, and businesses have the biggest targets on their backs. Email interception occurs when any unauthorized user gains access to an email that he/she wasn’t meant to see. This is a complicated type of...
Recent Comments