2017

October 24, 2017
Comments [0]

Spam is supposed to be a thing of the past, but it’s not—and today it comes weaponized with manifold data-grabbing threats—from ransomware to keystroke recorders and beyond. Your email has never been more dangerous.

There was a time in the early 2000s when email spam and malicious botnets were viewed as mere nuisances. A confident Bill Gates waved it away at the 2004 World Economic Forum in Davos, Switzerland: “Two years from...

Read More
October 23, 2017
Comments [0]

When an emergency strikes, you might already have a plan, at least for most of the typical threats. Your plan can be highly detailed or very general, depending on the likelihood of the incident. If you live in a region known for tornadoes, you might already have an interior closet or basement room that’s designated as your shelter. If your part of the state is susceptible to wildfires, you might have a home evacuation plan. If you live in a coastal area, you...

Read More
October 20, 2017
Comments [0]

With less than eight months before the European Union’s General Data Protection Regulation (GDPR) goes into enforcement, there isn’t a moment to lose for subject companies. On May 25, 2018, inaction could cost up to 20 million euros or 4 percent of total worldwide annual revenue, whichever is higher.

To get you started, we’re sharing five tips from our GDPR Compliance Guide. After helping dozens of...

Read More
October 19, 2017
Comments [0]

The quantity of things that Americans leave at TSA checkpoints is staggering.

Last year alone, the TSA collected nearly $1 million worth of coins and bills forgotten by travelers at security checkpoints. At the Los Angeles International Airport in a singlemonth in 2015, the TSA found 154 laptops, 98 cell phones, 229 driver’s licenses, 18 iPads, and 32 wallets—3,705 items in all, according to the LA Times.

And each year, this figure rises.

So imagine how many laptops will...

Read More
October 13, 2017
Comments [0]

The number of Internet of Things (IoT) devices in use is forecasted to hit 8.4 billion this year. That’s more than the human population on planet Earth. And with successful attacks like Mirai (which was the malware used in the 2016 Dyn cyberattack) already a part of the IoT story, there’s plenty to worry about.

...

Read More
October 4, 2017
Comments [0]

The astonishing rash of disclosures of data breaches at top-tier organizations continues. Big Four accounting firm Deloitte has joined Equifax and the U.S. Securities and Exchange Commission in going public about a catastrophic loss of sensitive data.

Ironically, Deloitte a few years ago branched from its core auditing and tax services to high-end cybersecurity consulting. PricewaterhouseCoopers, another member of the Big Four...

Read More
October 2, 2017
Comments [0]

The Identity Theft Resource Center (ITRC) and CyberScout have released findings from a timely new study that reveals how people respond to a data breach. Their reactions: confusion, distrust, frustration, anger and anxiety.

When people were notified that their personal information was exposed in a data breach, nearly half (49 percent) were confused about what to do. Many (31.5 percent) didn’t know where to turn for help. Three...

Read More
October 1, 2017
Comments [0]

Remember the federal Cybersecurity Information Sharing Act (CISA)? It was a law passed less than two years ago, charged with improving cybersecurity in the United States through enhanced sharing of information about cybersecurity threats between and among the government and companies.

... Read More
September 28, 2017
Comments [0]

For businesses across Canada, the fall of 2017 will bring a dramatic shift to privacy and cyber security regulations. That’s when an amendment to Canada’s Personal Information Protection and Electronic Document Act (PIPEDA), the federal privacy law for private-sector organizations, will finally take effect. Moving forward, businesses that experience a data breach but neglect their responsibilities under the new amendment could quickly find themselves in hot water...

Read More
September 27, 2017
Comments [0]

Jen* is one of the few people that opens and reads every piece of mail they receive. It’s a quirk that has paid off: A piece of junk mail is how Jen found out someone had stolen her identity.

“I opened a letter from Macy’s, which I thought was weird,” she said. “I haven’t shopped there in years. But the letter was a rejection of a credit card application.”

Jen took immediate action, ...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started