All organizations depend on IT to keep operations up and running. That means tech mistakes – even seemingly minor ones – can have a huge impact on the organization and its bottom line.
In recent years, many victims of IT security incidents have filed data breach lawsuits. When are companies being held accountable after data is stolen?
One of the trickiest parts about IT security is recognizing when a breach has occurred so the damage can be mitigated. And that’s especially the case when organizations ignore clear warnings about vulnerabilities.
Despite hackers’ new sophisticated techniques, many data breaches still occur because of basic IT security mistakes. In this post, guest author Vanessa James lays out four critical steps for protecting databases.
Allowing users to carry sensitive data on a portable computing device creates a certain amount of risk. But here’s a data breach that occurred because several pieces of IT equipment were stolen from an employee’s car.
This past year was a rough one for IT security. Hackers gained access to billions of sensitive records in 2012, using a mix of sophisticated new attacks and old techniques – as well as exploiting some big mistakes on the part of organizations.
It happens – cybercriminals use stolen passwords to hack into other accounts. Despite the warnings, people still reuse passwords across multiple sites. This recent incident is proof.