How to Increase Transparency and Rebuild Trust After a Data Breach

Read David Strom’s article about why the best data breach response is rebuild trust and increase transparency on Security Intelligence : As more companies suffer breaches and leak private data online, it becomes harder for organizations to be transparent and establish trust with their customers. Recent incidents have shown that many experts underestimated the total […]

What to Do When You Find Yourself in the Data Breach Club

Read Veronica Jackson’s article about what companies who have suffered a data breach can do on JDSupra : In the wake of the latest massive data breach, this one involving Equifax, more and more companies are likely wondering what they should do in the event that they are faced with a data breach that exposes the […]

Three Mistakes in Responding to Security Incidents, and What To Do Instead

It’s all about time; responding promptly to the threat of any cyber incident is the most important part of any response. However, according to a recent white paper from security consultant Derek A. Smith: “Effective Incident Response Through User Activity Monitoring.” Read more about the new white paper by security consultant Derek A. Smith which takes […]

10 Things Your Small Business Data Breach Response Plan Must Have

Read Gabrielle Pickard-Whitehead list 10 things every small and medium business data breach response plan must have on Small Biz Trends : The 2016 State of SMB Cybersecurity Report from cybersecurity software company Keeper found hackers have breached half of the 28 million small businesses in the U.S. With small businesses becoming increasingly under cyber-security and data […]

Navigating Misaligned Law Enforcement and Company Interests in Data Breach Investigations

Read Kim Peretti and Justin Hemmings’ article about navigating misaligned law enforcement and company interests in data breach investigations on Lawfare Blog : The ubiquity of data breaches can create a misperception that data breach investigations are routine. In reality, these investigations can be surprisingly complex and are unlike other law enforcement investigations. Most significantly, […]

Four best practices in responding to a security breach

From Tesco’s cyberheist to the attacks carried out over Swift’s system, it’s clear the financial industry is a gold mine for cybercriminals – there’s been a 40% increase in cybercrimes targeting the financial sector over the past year despite improved risk management. Read about the four best practices to respond to a data breach according […]

Why a data breach response plan is critical to SMEs

Read  Jim Steven explain why small and medium businesses should have a good data breach response plan on SME Web : You don’t see it coming, you may never know who’s behind it or exactly how badly you’ve been affected… until it’s far too late. UK SMEs are under threat from data breaches, and this […]

U.S. Promotes Risk-Based Data Breach Response Model

The exiting Obama administration has embraced a risk-based approach to data breach preparation and mitigation for federal agencies in an Office of Management and Budget memorandum, cybersecurity professionals told Bloomberg BNA. Read more about the risk-based data breach response model being put forward by President Obama on Bloomberg BNA.

Why a data breach response plan is critical to SMEs

Read why Jim Steven says that a data breach response plan is necessary for small and medium enterprises on SME Web : You don’t see it coming, you may never know who’s behind it or exactly how badly you’ve been affected… until it’s far too late. UK SMEs are under threat from data breaches, and […]

Appointing a Cyber Point Person to Minimize Impact of the Inevitable

Read why says that companies should appoint a cyber point person to minimize the impact of inevitable data breach on New York Law Journal : As information has become an increasingly valuable commodity for all businesses, it has also become extremely valuable for hackers and criminal organizations. The tools that the bad actors are using […]