The recent theft of an unencrypted laptop computer containing information on more than 9,500 patients of a hospital and a home health agency has Connecticut's Attorney General asking for an explanation.
After a breach, some organizations meet the minimum requirements for notification and then hope for the best. The Utah Department of Health is taking a very different approach that's worthy of imitation.
Two unencrypted USB keys carrying copies of information about voters in Ontario, Canada, are missing, potentially exposing information on between 1.4 million and 2.4 million individuals, according to Elections Ontario officials.
Michaels craft stores. TRICARE. Global Payments Inc. These are among the most recent and prominent examples of third-party data breaches that adversely impacted financial institutions, healthcare providers and other affiliated entities.
How prepared is your organization to respond to a third-party breach - not just...
How an organization communicates in the wake of a major breach incident can play an important role in maintaining the organization's reputation and minimizing the financial impact.
But how can your organization avoid mismanaging post-breach communication and potentially wasting millions of dollars?
Join us for...
Is your organization at risk of a hacktivist attack? If so, are you prepared to respond?
The past two years have seen entities such as Sony, the FBI and the Egyptian government fall victim to data leaks, denial of service attacks and plain public embarrassment by hacktivist groups such as Anonymous, LulzSec and...