When a Corporate Data Breach Happens: Critical Next Steps

Corporate Breach Response

What if my Business is Next?

Regardless of cybersecurity proficiency, no organization is safe from data breaches. That’s why it’s critical that every business develops and documents an Incident Response Plan. Your response plan will outline steps your organization should take if you suspect data has been compromised. The quicker your business follows the plan, the better off you will be, and you will be in a position to mitigate the impact the data loss will have on your business. Continue reading

Healthcare Data Breach Toolkit for Victims & Providers

Healthcare Data Breach Toolkit

It seems like almost every day a new healthcare agency, facility, or network is reporting a data breach.

A lot of it may have to do with the fact that many healthcare organizations have outdated IT systems and lack focus and investment in cybersecurity tools. There’s also employee error, which can inadvertently open up the flood gates to hackers. All of this, combined with the treasure trove of Personally Identifiable Information (PII), known in the industry as Protected or “Personal” Health Information (PHI), on their networks, makes healthcare providers an appealing target. In addition, a successful breach can generate millions of dollars for cybercriminals on the Dark Web. Continue reading

Risk of Identity Theft is a Costly Proposition for SMBs

Small Business Owner Looking at Laptop

*Originally posted June 18, 2019. Updated June 22, 2020.*

Much like individuals, businesses can be victims of identity theft. However, unlike personal identity theft, it is often unclear how a Small and Medium-Sized Business (SMB) can recover from the financial and reputational impact. Business identity theft occurs when criminals impersonate a company to target its funds, file fraudulent tax returns, take out loans, or apply for lines of credit — all for financial gain. Continue reading

Stay On Top Of Business Email Compromise

Business Person Checking Email on Mobile Device

*Originally Posted July 11, 2016. Updated May 27, 2020*

You’ve heard the old saying: “Don’t open an email from someone you don’t know.” You assume that your employees understand how to spot a phishing scam with illegitimate hyperlinks or suspicious attachments with odd file extensions. But what if they receive an email that appears to come from your financial adviser, your business’ trusted vendor, or even you? The Federal Investigation Bureau (FBI) has anticipated an uptick in BEC scams during the coronavirus pandemic. Since the beginning of the crisis, businesses are seeing 80% of scam emails are using COVID-19 messages. Continue reading