As more states ratchet up the penalties for data breach notification and remediation, the costs of even small (sub 10,000 record) breaches soar. Even small professional practices often can count several thousand consumer or business records in their systems. Exposing several thousand in a breach and having to offer credit…
"Good News for hackers: People still plug found USB sticks into their Computers", a great example of social engineering by CompTIA. As it turns out, more than 1 in 6 people will pick up a "found" USB flash drive from a public place and plug it in to see what’s…
In what has become a “tip of the iceberg” wave of security breach reporting, most companies suffer the effects quietly. Each year we look back on countless examples of large and small companies falling victim to cyber security breaches. While the largest cases (often with tens…
It's unavoidable today. Personal computers, smart phones, tablets, and other network and Internet connected devices run software from multiple sources. That’s great and it makes us pretty happy most of the time. We get great software, communicate fluidly and quickly, and work more efficiently. The problem is that software can…