The nonprofit group Open Privacy Research Society recently publicized that the confidential medical and personally identifiable information (PII) of patients across Vancouver, Canada, is being leaked through the paging systems of hospitals in the area. What do
Data Breach: A data breach is an incident where information, typically data that is sensitive, proprietary or confidential in nature, is stolen or taken from a system without the knowledge or authorization of the system’s owner. Read more
In light of the massive data dump called Collection #1 and with more available for download and exchange in the underground, here are a few reminders for users and enterprises on how to mitigate threats on their personal information and enterprise assets.
To move forward, we need to look into the past to figure out what the best course of action is. Take a trip down memory lane with this infographic to see how far we've come in securing the digital world.
A review of the first half of 2018 shows a threat landscape that not only has constant and familiar features but also has morphing and uncharted facets: Ever-present threats steadily grew while emerging ones used stealth.
Data breaches take time and a lot of effort to pull off, but successful breaches can affect not just organizations, but also millions of people. Learn what a data breach is, what types of data is usually stolen, and what happens to stolen data.
With today’s ever-evolving threat landscape, data breaches are no longer isolated cases. Responding to and remediating data breaches calls for a proactive approach — something that managed detection and response (MDR) can provide.