Breach victims who sign up for free fraud-monitoring services from breached businesses that lost control of their data often sign away their right to join class-action lawsuits or pursue other legal actions, and Marriott proved to be no exception, following its mega-breach. But it now appears to be backing off.
Is there anything better than being offered one year of "free" identity theft monitoring? Regularly offered with strings attached by organizations that mishandled your personal details, the efficacy and use of such services looks set for a U.S. Government Accountability Office review.
Google says a buggy API update it pushed last month for its soon-to-be-mothballed Google+ social network exposed personal information for 52.2 million users. The data-exposure alert arrives just two months after Google admitted that a March problem with the same API exposed data for 500,000 users.
The massive data breach suffered by Equifax in 2017 "was entirely preventable," according to a report released by the House Oversight Committee's Republican majority. Some Democratic lawmakers have slammed the report for failing to advance legislative or oversight changes to help prevent breaches.
Victims of the massive Marriott International data breach, which exposed data for 500 million customers, including some passport numbers, may be able to claim reimbursement for the cost of obtaining a replacement passport, provided they can prove it led to fraud.
Yet another cyberattack against a cloud-based electronic health records vendor has been revealed. This one involved a ransomware attack that potentially exposed data on 16,000 patients of a California eye clinic. What can healthcare organizations do to minimize vendor risks?
A batch of documents meant to be kept under court seal lays bare Facebook's strategic brokering of access to user data to reward partners and punish potential rivals. The material also demonstrates Facebook's views at the time on privacy and the risks of leaking data.
Hampered by insufficient tools and skills, many organizations are now investing in managed detection and response solutions. What questions should they ask when selecting a partner? Sharda Tickoo of Trend Micro shares insights.
Find out all the benefits of using one security solution across your on-premises data center and AWS cloud workloads. Get expert insight on use cases, plus informative real-world examples plus more about how the cloud services hub/Transit VPC Solution leverages the cloud's scalable network to provide security services...
Given the importance of email in business communication, the prospect of a breach can seem daunting. But organizations can ease the risk by leveraging effective security solutions. Implementing email encryption and data loss prevention (DLP) solutions can help you minimize your greatest security vulnerability -...
Organizations looking to ensure the success of their Office 365 migration carefully plan to reduce risk. While this transition can yield significant cost and time savings, the lack of options for email encryption is a real limitation. Integrating your Office 365 environment with ZixEncrypt combines the benefits of...
Not all email encryption solutions are created equal. Modern solutions balance security with ease-of-use, eliminating barriers that would otherwise cause senders and recipients to jump through unnecessary hoops.
Download this eBook to discover:
The vulnerability created by email;
The drawbacks presented by most...
Email is the most used business communication tool. This means the vulnerabilities of email should not be overlooked. Implementing the right email encryption solution can help secure sensitive corporate data, avoid the costs associated with breaches and meet regulatory obligations.
Download this eBook to learn more...