Ransomware-attack
Cybersecurity

Ransomware Attack Highlights Need for Better Cybersecurity Tools and Methods

Short on time? Listen instead. A data breach is one of the most invasive and disheartening situations to which a cybe...

optin-examp-not-to-do
Cybersecurity

OPTN Provides An Example Of What Not To Do In Cybersecurity

Short on time? Listen instead. Cybersecurity threats to your organization’s systems, networks, and data can arise any...

Cybersecurity - Due Diligence
Cybersecurity

Cybersecurity – Due Diligence and Due Care. What are they?

Short on time? Listen instead. Two of the most basic tenets of cybersecurity management, due diligence and due care, ...

Privacy Violations Suit
Compliance and Regulatory

Privacy Violations Suit Provides Cautionary Tale

Short on time? Listen instead. A civil suit purporting privacy violations, filed in the U.S. Northern District of Cal...

Cyberbullying
Quick Tips

Cyberbullying

Short on time? Listen instead. What is cyberbullying? It is using the Internet, primarily social media and messaging ...

Cybersecurity Awareness Month - Scams
Cybersecurity

Cybersecurity Awareness Month – Scams

Short on time? Listen instead. At some point during your digital life, online or off, you have been subjected to at l...

Dental Care Alliance Data Breach
Cyber Breach

Dental Care Alliance Data Breach Settlement to Cost Them Millions

Short on time? Listen instead. Note: This is an ongoing case. We will update this post as more information becomes av...

congress-cyber-bills
Compliance and Regulatory

Three Recent Cybersecurity Bills From Congress

Short on time? Listen instead. The United States Congress has recently enacted three new cybersecurity bills to comba...

identify a Possible Scam
Scams

How to Identify a Possible Scam Phone Call

Short on time? Listen instead. “Hello! My name is ‘John Doe,’ and I am calling from Tech Support. Your computer notif...

HIPAA Violation Costs Oklahoma
HIPAA

HIPAA Violation Costs Oklahoma State University Large Penalty

Short on time? Listen instead. Beginning in March of 2016, Oklahoma State University’s Center for Health Sciences (OS...

Cyber-Security
Cybersecurity

Why is your organization’s cybersecurity program so important?

Short on time? Listen instead. With an almost constant flow of news about cybersecurity breaches worldwide, it is evi...

DATA CLASSIFICATION–When to Begin
Cybersecurity

DATA CLASSIFICATION–When to Begin?

Short on time? Listen instead. Planning for the security of your data is one of the most proactive and essential step...