As consumers become more careful about sharing data, and regulators step up privacy requirements, companies are learning that data protection and privacy can create a business advantage. Consumers value companies who keep their valuable personal information private and are not trusting their data to companies that do not have their policies published and lack transparency. […]
Data security is the practice of protecting digital information from unauthorized access, corruption, or theft throughout its entire lifecycle. This concept encompasses every aspect of information security from the physical security of hardware and storage devices to administrative and access controls. It also includesthe logical security of software applications, as well as organizational policies and […]
Have you been involved in a data breach? Find out if your data’s been breached and what to do if it is. This guide will help you find out where and when, and lists the steps you should take next. Data breaches are security incidents we now hear about in every day cybersecurity news. They […]
LastPass started notifying their users of a recent security incident where an “unauthorized party” gained access. The malicious hacker used a compromised developer account to gain access to parts of the password manager’s source code and some proprietary LastPass technical information. In a letter to LastPass users, the company’s CEO Karim Toubba explains that its investigation […]
Streaming media platform Plex sent out an email to its customers notifying them of a security breach that may have compromised account information, including usernames, email addresses, and passwords. Plex stated, “all account passwords that could have been accessed were hashed and secured in accordance with best practices,” however they’re still advising all users to […]
In todays world data breaches happen on a daily basis, involving everything from device theft to vulnerability exploitation and open AWS buckets exposed for the world to see. Businesses and home users alike must educate themselves and employ encryption software to protect their personal, business, and critical data that they may be legally liable for […]