The recent theft of an unencrypted laptop computer containing information on more than 9,500 patients of a hospital and a home health agency has Connecticut's Attorney General asking for an explanation.
After a breach, some organizations meet the minimum requirements for notification and then hope for the best. The Utah Department of Health is taking a very different approach that's worthy of imitation.
Two unencrypted USB keys carrying copies of information about voters in Ontario, Canada, are missing, potentially exposing information on between 1.4 million and 2.4 million individuals, according to Elections Ontario officials.
How an organization communicates in the wake of a major breach incident can play an important role in maintaining the organization's reputation and minimizing the financial impact.
But how can your organization avoid mismanaging post-breach communication and potentially wasting millions of dollars?
Join us for...
Is your organization at risk of a hacktivist attack? If so, are you prepared to respond?
The past two years have seen entities such as Sony, the FBI and the Egyptian government fall victim to data leaks, denial of service attacks and plain public embarrassment by hacktivist groups such as Anonymous, LulzSec and...
In this week's breach roundup, read about the latest incidents, including a phishing e-mail affecting U.S. Commodity Futures Trading Commission employees and a cruise line accidentally e-mailing sensitive passenger information.