Get it right or get out of the way

When a company has a break down in its processes blame is assigned based on whom the process owner is and the individual(s) responsible for completing the missed or an improperly executed task. When a low-level process is broken such as the case was with Experian and the missing Apache Struts patch that allowed an attacker to gain... Continue reading Get it right or get out of the way

Keyboard Maker AI.Type Latest Data Breach

Recently there has been a massive data breach that exposed millions of people. Upon installing the Ai.Type keyboard the application requested full access to your phone which recorded every letter or number you typed. Why would a keyboard and emoji application need to gather the entire data of the user’s phone or tablet? Great question.

Steps You Should Take After a Data Breach

A data breach is a cataclysmic invasion of privacy which can wreak havoc on both businesses and private individuals. 2017 surpassed the total number of data breaches in 2016 by mid-year. Today we touch up on what to do after a data breach.

Forever 21 Data Breach

Forever 21 implemented encryption and tokenization in 2015, but it appears the security measures were not implemented at some point-of-sale machines. On Tuesday Forever 21 was notified by a third-party that there “may have been unauthorized access to data from payment cards” between March 2017 and October 2017.

Briggs Stratton Healthcare Information Breach 2017

Briggs and Stratton, a maker of gasoline engines for outdoor power equipment, were breached and client information was stolen. NATURE OF THE BREACH Briggs and Stratton experienced a malware attack(software that is intended to damage or disable computers and computer systems) on Briggs’ computer systems at its Milwaukee, Wisconsin and Munnsville, New York locations that potentially compromised information... Continue reading Briggs Stratton Healthcare Information Breach 2017