Breaches

Broadening Focus

By |October 16th, 2017|News|Comments Off on Broadening Focus

If I say Equifax, you likely don’t think of credit reports first. Data breach comes to mind even if you weren’t one of the […]

The Numbers on Data Breaches

By |October 5th, 2017|News|Comments Off on The Numbers on Data Breaches

Data security is an ongoing challenge for every organization. A recent report reveals the frequency of data breaches only continues to grow. Becker’s Health IT […]

Inside Data Breaches

By |August 7th, 2017|Access Insights, Featured|Comments Off on Inside Data Breaches

Data breaches spiked by 86 percent in 2016 with over 1.4 billion records being compromised. Hackers, cyber criminals and other malicious outsiders were responsible for just […]

Latest Attempt in Cyber Warfare

By |June 30th, 2017|News|Comments Off on Latest Attempt in Cyber Warfare

Many major firms, airports and government departments in Ukraine have been struck by a massive cyber attack which spread across Europe this week. This interesting […]

Data Compromise with Phishing Attack

By |May 5th, 2017|News|Comments Off on Data Compromise with Phishing Attack

In another case of cyber theft, Gannett warns employees of a possible data breach. We learned of this from Kalb in their article, “USA […]

Cyber Security a Concern in All Organizations

By |May 3rd, 2017|News, Technology|Comments Off on Cyber Security a Concern in All Organizations

A hacker claims to have followed through on a threat to release several episodes from an upcoming season of Netflix’s hit series Orange Is […]

Security Concerns Drive Development

By |April 26th, 2017|News|Comments Off on Security Concerns Drive Development

The fear of data breaches is constant for most information management professionals. Staying compliant and keeping data secure drive their day-to-day. CMS Wire brought this news […]

The Biggest Risk is Inside

By |March 22nd, 2017|News|Comments Off on The Biggest Risk is Inside

Data security for any organization is of great importance. Keeping hackers out of their systems and data is a huge part of their information management […]