A data breach is a cataclysmic invasion of privacy which can wreak havoc on both businesses and private individuals. 2017 surpassed the total number of data breaches in 2016 by mid-year. Today we touch up on what to do after a data breach.
Human traffickers worldwide are increasingly using social media to contact vulnerable victims. Human traffickers know how to search out a needy child or teenagers who may be insecure and wanting attention. The trafficker may appear to take a special interest in the child and tell them what they want to hear…this is called grooming. Once... Continue reading Human Traffickers Use Social Media to Lure Victims
Briggs and Stratton, a maker of gasoline engines for outdoor power equipment, were breached and client information was stolen. NATURE OF THE BREACH Briggs and Stratton experienced a malware attack(software that is intended to damage or disable computers and computer systems) on Briggs’ computer systems at its Milwaukee, Wisconsin and Munnsville, New York locations that potentially compromised information... Continue reading Briggs Stratton Healthcare Information Breach 2017
Do you know which data your antivirus collects during scans? Antivirus has kernel level access to the operating, meaning there isn’t a file on your computer hard drive that it can’t touch. Antivirus scans data that is being read from and written to the hard drive, and depending on which antivirus company you choose, data... Continue reading How Much Do You Trust Your Antivirus Company?