BreachExchange: by author

287 messages starting May 20 16 and ending Jun 30 16
Date index | Thread index | Author index


Audrey McNeil

How employees can share the IT security load Audrey McNeil (May 20)
US Launches Criminal Inquiry Into 200 US Citizens Named In The Panama Papers Audrey McNeil (Apr 28)
The Rules: View your business as a data company or pay the price Audrey McNeil (May 16)
The Panama Papers Signal A New Kind of Cyber Attack Audrey McNeil (Apr 11)
Google Dorking: Exposing The Hidden Threat Audrey McNeil (Jun 13)
Penn. court dismisses healthcare breach class-action lawsuit Audrey McNeil (May 04)
PCI Turns 10: Will It Last Another 10 Years? Audrey McNeil (Jun 16)
Unusual Ploy in Anthem Breach Case Fails Audrey McNeil (Apr 11)
Is Your Accounting Firm at Risk from Identity Thieves? Audrey McNeil (Apr 28)
7 Profiles Of Highly Risky Insiders Audrey McNeil (Apr 11)
How to limit risks from phishing threats Audrey McNeil (Apr 08)
The top 5 security tips you must pass along to your staff Audrey McNeil (Jun 27)
5 Ways Providers Can Prevent Patient Data Breaches Audrey McNeil (Jun 06)
Cyberattacks can cripple the construction industry Audrey McNeil (Jun 06)
Employee Data Security: Perquisite or Prerequisite? Audrey McNeil (May 27)
Thwarting Healthcare Cyberattacks: New Guidance Audrey McNeil (Apr 04)
Corporate employees are your worst IT risk Audrey McNeil (Jun 20)
Achieving holistic cybersecurity Audrey McNeil (May 13)
Data breached? You’re in good company Audrey McNeil (Jun 16)
Ransomware has been labeled the biggest threat this year, but is it as dangerous as it's made out to be? Audrey McNeil (Jun 07)
O’ Really, Canada? Data Breach Log Rules Underway Audrey McNeil (Apr 19)
6 Steps To Survive a Cyber Attack Audrey McNeil (Apr 29)
Keeping Personal Health Information Secure in an Era of Cyberattacks Audrey McNeil (May 20)
Incident response and establishing the hierarchy of data Audrey McNeil (Jun 06)
Managing insider cybersecurity risk: 5 key findings Audrey McNeil (May 25)
Why you should be prioritising cyber security risk management Audrey McNeil (Jun 10)
Cyber Insurance Coverage Gaps May Surprise Many Organizations Audrey McNeil (Apr 07)
Components of modern hacking operations Audrey McNeil (Jun 06)
HomeUK UK cybercrime prosecutions rise 34% in 1 year Audrey McNeil (May 25)
'Cyber Hygiene' Could Prevent the Next Attack Audrey McNeil (Apr 07)
How to perform a data breach notification Audrey McNeil (Apr 05)
Privacy and Cybersecurity Issues in Canadian M&A Transactions Audrey McNeil (Apr 05)
SSL: The unchecked security blind spot Audrey McNeil (Apr 15)
Cyber risk management -- Is your company ready for anything? Audrey McNeil (Jun 09)
Data protection for small entities Audrey McNeil (May 11)
Few consumers penalize companies after data breach, study finds Audrey McNeil (Apr 15)
Don’t delay when it comes to data protection Audrey McNeil (May 11)
7 common cyber security myths debunked Audrey McNeil (May 31)
Cyber policies may not cover third-party risk Audrey McNeil (May 31)
Lawmakers probe large data breaches at US bank insurance agency Audrey McNeil (May 13)
Target’s Cyber Insurance: A $100 Million Policy vs. $300 Million (So Far) In Costs Audrey McNeil (Apr 11)
Firms face £20million fines for losing your private data: Report also says firms' bosses should be penalised if businesses suffer a data breach Audrey McNeil (Jun 22)
Human error biggest risk to health IT Audrey McNeil (Jun 10)
Hackers in your network? Why kicking them out straight away is not always the best approach Audrey McNeil (Jun 15)
IT risks that health care firms can overlook Audrey McNeil (Apr 01)
The Vigilante Who Hacked Hacking Team Explains How He Did It Audrey McNeil (Apr 18)
Finally! LinkedIn Comes Clean About Mass Data Breach Audrey McNeil (May 31)
5 Ways Malware Can Creep into Your System Audrey McNeil (Apr 15)
The Operational And Cyber Security Benefits Of An IT-Centric Access Control Solution Audrey McNeil (May 06)
Block malware, ransomware, and phishing with 5 layers Audrey McNeil (Jun 17)
Avoiding Legal Landmines in Data Breach Response Audrey McNeil (Apr 04)
Ontario health privacy breach notification bill passes third reading Audrey McNeil (May 12)
Cybersecurity: Why do we spend more but get less? Audrey McNeil (Jun 22)
From Ashley Madison to the Panama Papers: Is Hacked Data Fair Game? Audrey McNeil (Apr 26)
Staying Ahead of the Threat Audrey McNeil (Apr 15)
How Steel City Became the Front Line in America’s Cyberwar Audrey McNeil (May 16)
The strategic risk of cybercrime: Prevention deserves the highest priority Audrey McNeil (Jun 13)
How Many Times Do We Have to Tell You Not to Open the Cat Video Audrey McNeil (Apr 12)
QNB hacking: what we know so far Audrey McNeil (May 03)
Data Breaches Continue to Be Focus of Consumer Complaints Audrey McNeil (May 18)
Think You’re Too Small for a Security Threat? Think Again. Audrey McNeil (May 25)
Two Year Anniversary for Heartbleed: Still Many Vulnerable Devices Audrey McNeil (Apr 08)
Lone Hacker Claims to Have Breached DNC Audrey McNeil (Jun 17)
Communicating Data Breaches with Employees Audrey McNeil (Jun 17)
SQL injection: why is the oldest hack in the book still causing big problems? Audrey McNeil (May 24)
Cyber villains pose greater risks to smaller companies Audrey McNeil (Jun 07)
Data Breach Class Action Against Health Plans Rejected Audrey McNeil (Apr 29)
LinkedIn data breach blamed for multiple secondary compromises Audrey McNeil (Jun 24)
When It’s Your Turn To Be Hacked Audrey McNeil (Apr 04)
Data breach covered under commercial general liability policy, court rules Audrey McNeil (Apr 14)
Power Outage Shows Hacker Threats Are a Real Threat to the Food Industry Audrey McNeil (May 04)
This is how hackers stole millions from your company Audrey McNeil (Jun 15)
New York hospital reaches $2.2M settlement over TV filming Audrey McNeil (Apr 22)
There must be smarter security than a ban on ‘dumb’ passwords Audrey McNeil (Jun 07)
Cyber attacks: Two-thirds of big UK businesses targeted Audrey McNeil (May 11)
Outsmart the bad and safeguard the good Audrey McNeil (May 10)
GhostShell Is Back Exposing Open FTP Directories Audrey McNeil (May 17)
The frustrating aftermath of a data breach at American Type Culture Collection Audrey McNeil (May 31)
OCR Releases New HIPAA Audit Protocol Audrey McNeil (Apr 05)
The Paper Trail: The Potential Data-Breach Sitting in your Printer Audrey McNeil (Jun 16)
How a cybercriminal might infiltrate your corporate network Audrey McNeil (Apr 26)
You’ve been hit with ransomware. Now what? Audrey McNeil (Apr 22)
The 90s Hacking Trick Making a Comeback Audrey McNeil (Jun 09)
7 ways to enlist employees in the war on cybercrime Audrey McNeil (May 02)
How to build a security operations centre that defeats hackers Audrey McNeil (Jun 15)
Five Reasons Why Classification Is the First Step to Successful Data-Loss Prevention Audrey McNeil (Jun 23)
You Can Prevent a ‘Panama Papers’ Scandal at Your Law Firm Audrey McNeil (May 04)
Nulled.IO: Should’ve Expected The Unexpected! Audrey McNeil (May 11)
4 HUGE Misconceptions About Business IT Security Audrey McNeil (May 27)
Analyzing Whether HIPAA’s ‘Industry Standard’ Means You’re Safe From Cyber Attacks Audrey McNeil (Apr 19)
The Panama Papers: What does this data breach mean for IT and cybersecurity? Audrey McNeil (Apr 28)
The Marriage of Ransomware and DDoS Audrey McNeil (Jun 09)
Are You Prepared for Your Vendor’s Data Breach? Audrey McNeil (May 17)
Retailers fight to silence customer data breaches Audrey McNeil (Jun 06)
Staying Ahead of the Threat: Why Security Awareness is Vital to Your Organization Audrey McNeil (Apr 18)
P.F. Chang's Ruling: Is the Tide Shifting? Audrey McNeil (Apr 22)
Iowa hospital underscores risk of protected health information breaches from within Audrey McNeil (May 16)
Cybercrime Victims: Please Come Forward Audrey McNeil (Jun 15)
Are California’s New Data Security Standards a Recipe for Liability? Audrey McNeil (Apr 12)
Protecting your trade secrets Audrey McNeil (Apr 14)
Seventh Circuit, Relying on Defendant’s Post-Breach Statements, Allows Data Breach Class Action to Proceed Audrey McNeil (Apr 18)
Australia, New Zealand Still Mulling Data Breach Laws Audrey McNeil (May 27)
Is Paying up the Only Response to Ransomware? Audrey McNeil (May 24)
Georgia Husband and Wife Plead Guilty In Stolen Identity Tax Refund Fraud Scheme Involving IRS “Get Transcript” Database Audrey McNeil (Apr 26)
Dealing with data breach Audrey McNeil (Jun 21)
Data breach notifications Audrey McNeil (Jun 16)
Extending cybersecurity to fraud analytics Audrey McNeil (Jun 20)
Cyber Security Audrey McNeil (May 24)
Cyber Criminals Upping The Ante Audrey McNeil (Apr 14)
Don't overlook these two hidden risks to your corporate data Audrey McNeil (Apr 27)
Ransomware: A Business Designed To Disable Your Business Audrey McNeil (May 31)
Life Just Got Harder For Class-Action Lawyers As Court Rejects 'No-Injury' Cases Audrey McNeil (May 18)
From VTech to Ashley Madison: How the hacks of 2015 are reshaping cyber security Audrey McNeil (Apr 27)
Only a third of companies know how many vendors access their systems Audrey McNeil (Apr 14)
The legal consequences of a cyber-attack Audrey McNeil (Apr 26)
Can Pakistan's New Cybersecurity Law Help Combat Cybercrime? Audrey McNeil (May 11)
What Is SQL Injection and How Can It Hurt You? Audrey McNeil (Jun 27)
Are CISOs Building Effective Business Cases for Data Security Investment? Audrey McNeil (Apr 08)
Panama Papers: What Attorneys Can Learn from History’s Largest Data Breach Audrey McNeil (Jun 22)
Data Breaches – Just a Cost of Doing Business or Tip of the Spear for Threats to Business? Audrey McNeil (Jun 24)
How to do disaster recovery without disrupting your business operations Audrey McNeil (May 09)
Why It Matters Who Hacked the Democratic National Committee Audrey McNeil (Jun 21)
How a relatively minor cyber attack cost TalkTalk £42m Audrey McNeil (May 13)
Cybersecurity Compliance Just Got Tougher Audrey McNeil (Apr 25)
The Struggle For Both Privacy And Security Audrey McNeil (Apr 22)
Why you should care about the Panama Papers Audrey McNeil (Apr 12)
After high profile cyber attacks at firms like TalkTalk, companies ignore this risk at their peril Audrey McNeil (Apr 15)
7 security problems you can solve with Encrypted Traffic Management Audrey McNeil (May 09)
Data protection: Necessary evil or competitive edge? Audrey McNeil (May 03)
How enterprise security lapses led to the Panama Papers leak Audrey McNeil (Jun 13)
Ashley Madison attorney-client communications leaked in data breach Audrey McNeil (Apr 22)
The top security trends you need to know right now Audrey McNeil (Apr 11)
LinkedIn’s disturbing breach notice Audrey McNeil (Jun 07)
The worst thing about cybersecurity is the humans who use it Audrey McNeil (May 09)
Assess cyber risk scenarios before data thieves strike Audrey McNeil (Jun 10)
Why Isn't Healthcare Doing More To Protect Against Cyber-Attacks? Audrey McNeil (May 18)
One year after OPM cybertheft hit 22 million: Are you safer now? Audrey McNeil (Jun 13)
Chubb scores victory in key cyber ruling Audrey McNeil (Jun 07)
Hackers Increase Attacks on Local Governments Audrey McNeil (May 03)
Fix Computer Security by Acting like Macy’s Audrey McNeil (Jun 27)
Three questions to make security vendors sweat Audrey McNeil (Jun 13)
A security professional's guide to cyber insurance Audrey McNeil (Apr 28)
Structuring a Settlement After Asserting Class Members Did Not Suffer Any Concrete Injury Audrey McNeil (Apr 25)
Reporting of government privacy breaches varies widely Audrey McNeil (Apr 18)
Cybersecurity's weakest link: humans Audrey McNeil (May 06)
Security breaches under the spotlight Audrey McNeil (May 25)
Superior Court of Pennsylvania Denies Data Breach Class Certification Audrey McNeil (May 17)
Spear phishing: How it works and how to avoid it Audrey McNeil (May 06)
A Closer Look At The Fallout From The Home Depot Data Breach Audrey McNeil (May 10)
Why IT security experts feel unprepared for email attacks Audrey McNeil (May 09)
How Can Small Businesses Prevent Cyber Attacks? Audrey McNeil (May 24)
Remote Staff Suffers Data Breach, Customer Data Even More Remote! Audrey McNeil (May 19)
Cyberattacks: Is your business protected? Audrey McNeil (Apr 19)
Ever Hear of Pii? What You Need to Know About Its Life Cycle in Business Audrey McNeil (May 12)
Insider threat could use ransomware-as-a-service to profit from victims Audrey McNeil (Apr 29)
6 cybersecurity and emergency situations every IT department should train for Audrey McNeil (Jun 27)
Batten down the hatches: cyber-security attacks are becoming more aggressive Audrey McNeil (Apr 22)
Tennessee Breach-Notification Law Indicative of Data-Security Regulators’ Lack of Creativity Audrey McNeil (Jun 15)
'Data Guardians' Now On Watch After Hack at Medicare Agency Audrey McNeil (May 24)
Legal protection of databases Audrey McNeil (Jun 10)
Five keys to preparing for a data breach Audrey McNeil (Jun 20)
Employee Error Accounts for Most Security Breaches Audrey McNeil (Jun 09)
How can online behaviour guide the future of security? Audrey McNeil (Jun 20)
Why the C-suite should take a closer look at privacy controls Audrey McNeil (Jun 09)
Cybersecurity: You can't afford to ignore it anymore Audrey McNeil (May 09)
More CIOs report to the CEO, underscoring IT’s rising importance Audrey McNeil (May 27)
IP Addresses as Personal Data – Website Providers To Come Under Even More Scrutiny With EU Data Privacy Law Audrey McNeil (May 20)
Five most common myths about Web security Audrey McNeil (May 06)
Anatomy of a Data Breach: How Cybercriminals Get In Audrey McNeil (Apr 05)
Panama Papers are another blow to privacy Audrey McNeil (Apr 07)
New rules for data protection Audrey McNeil (Apr 04)
Hayden says private sector will lead cyber defense charge Audrey McNeil (May 13)
GDPR: potential fines for data security breaches more severe for data controllers than processors, says expert Audrey McNeil (May 12)
Anonymous Italy Targets Web Agency Engitel; Several Organizations Compromised Audrey McNeil (Apr 11)
Besa Mafia: Dark Web Hitman For Hire Site Takes A Hit Audrey McNeil (May 13)
Physical damage element of cyber re/insurance needs clarity Audrey McNeil (May 24)
Phishing: Data Breach Is “Chalkdust Torture” Audrey McNeil (Jun 21)
Ransomware: Attacks Against Government Agencies Widespread Audrey McNeil (Apr 01)
Deeper Dive: The Changing Landscape of Healthcare Data Breaches Audrey McNeil (Apr 08)
Judge Approves Sony Pictures Settlement to End Hacking Lawsuits Audrey McNeil (Apr 07)
Study: 23 percent of all data breaches occur in healthcare Audrey McNeil (May 10)
How HIPAA Violation can be Prevented with Regular HIPAA Training for Employees Audrey McNeil (Jun 15)
Cybersecurity: Don’t Become the Hacker’s Next Victim Audrey McNeil (Jun 23)
Rising Security Priorities: 5 Security Trends To Watch Audrey McNeil (May 06)
Thousands of taxpayers affected by W-2 Phishing attacks this year Audrey McNeil (May 03)
ICIT: Layered Defense Is Only Way To Combat Ransomware Audrey McNeil (May 06)
Cyber Insurer Seeks to Void Data Breach Coverage Because of Purported Misstatements in Policy Application Audrey McNeil (Jun 20)
4 Things You Need to Know About Data Loss Prevention Audrey McNeil (May 25)
P.F. Chang’s Arizona District Ruling Highlights Potential Pitfalls of Cyber Insurance Audrey McNeil (Jun 17)
Catch insider threats with User Behavior Analytics Audrey McNeil (May 27)
7 Network security tools every small business owner must have Audrey McNeil (Jun 17)
Bring the noise: How AI can improve cyber security Audrey McNeil (Jun 22)
Don’t Be Intimidated By Data Governance Audrey McNeil (May 27)
How Secure is Secure? Tips For Investing In The Right Strategy Audrey McNeil (Jun 21)
Does Your Company Have Coverage for PCI Fines & Penalties in its Cyber Policy? Audrey McNeil (Jun 27)
Cyber-security - Kryptonite for lawyers Audrey McNeil (Apr 15)
Financial Groups' Latest Campaign: "Stop the Data Breaches" Audrey McNeil (May 25)
Ensure that your employment contracts are fit for purpose for cyber-security Audrey McNeil (Apr 28)
District Court Grants Summary Judgment Against P.F. Chang’s In Cybersecurity Insurance Case Audrey McNeil (Jun 23)
Cyber Security Attacks Which Could Have Been Prevented Audrey McNeil (Jun 23)
Australia: From the Archives! 13, 000+ User Accounts Leaked From Fairfax Audrey McNeil (May 20)
Local data protection compliance: Mission impossible for SMEs? Audrey McNeil (May 11)
What happens to data after a breach? Audrey McNeil (Jun 24)
The four most important things to know about data governance Audrey McNeil (May 04)
Why small business should prioritise cyber security: Six top tips Audrey McNeil (May 10)
Cyber ruling opens door to CGL claims Audrey McNeil (Apr 27)
Insurance Coverage For Data Breaches May Be Found In Policies Other Than Those Specifically Called “Cyber” Audrey McNeil (Apr 19)
How Cyber Savvy Is Your Organization? Audrey McNeil (May 12)
Have retailers secured themselves against the Insider threat before you head to the checkout? Audrey McNeil (Apr 27)
5 Types of Law Firm Data Breaches, From Human Error to Hacktivism Audrey McNeil (Apr 08)
Safeguarding trade secrets Audrey McNeil (Apr 28)
As More Health Records Go Digital, Paper Still at Risk Audrey McNeil (Jun 22)
How to Proactively Defend Against Cyber Threats Audrey McNeil (Jun 22)
FTC Ruling in Battle with LabMD Delayed Audrey McNeil (Jun 21)
No Business Is Too Small For Hackers Audrey McNeil (May 04)
The cyber threat Audrey McNeil (May 20)
Preventing Business Identity Theft Audrey McNeil (Jun 23)
New Federal HIPAA Guidance Targets Data Security Incidents Audrey McNeil (May 20)
Home Depot Claims Visa, MasterCard Chip Cards Not So Secure In Lawsuit Audrey McNeil (Jun 17)
CISA Guidance Clarifies How to Share Cyber Threat Information… but Issues Remain Audrey McNeil (Apr 19)
Post-breach forensics: Building the trail of evidence Audrey McNeil (May 18)
Asset Managers and Cybersecurity Risk Management Audrey McNeil (Apr 12)
How much security is enough? Audrey McNeil (May 17)
Cybersecurity 101: Why it matters to your business Audrey McNeil (Jun 10)
BA Security Is Probably a Lot Worse Than You Think Audrey McNeil (May 17)
Before using third-party tools, publishers should ask themselves these questions Audrey McNeil (Apr 12)
Malicious Apps in Healthcare Put Patient Data at Risk Audrey McNeil (Apr 07)
10 Data Security Mistakes Startups Can't Afford to Make Audrey McNeil (Jun 23)
Wendy's Update On Unusual Credit Card Activity Audrey McNeil (Jun 13)
I'll take Cyber Insurance with that (please) Audrey McNeil (Apr 18)
Employees share passwords: here’s what that means for your business Audrey McNeil (Jun 20)
Microsoft Bans Simple Passwords That Appear in Breach Lists Audrey McNeil (May 31)
5 Tips For Making Data Privacy Part Of The Company’s Culture Audrey McNeil (Jun 24)
Buying and selling hacked passwords: How does it work? Audrey McNeil (Jun 24)
The Panama Papers – could it happen to you Audrey McNeil (Apr 14)
Are legal firms risking confidential information? Audrey McNeil (Apr 04)
The rise of shadow IT: Why IT administrators face risk data loss Audrey McNeil (May 31)
How to get the most out of your security investment Audrey McNeil (Apr 18)
Don’t let embarrassment about a data breach cost you even more Audrey McNeil (Apr 05)
Gumtree hack a reminder for SMEs not to have a “set and forget” mentality when it comes to online security Audrey McNeil (May 04)
Payment card industry issues data security standard update Audrey McNeil (Apr 29)
How to protect your business from security threats Audrey McNeil (Apr 27)
Do You Have Enough Cyber-Security Insurance? Audrey McNeil (May 18)
SQL injection: The oldest hack in the book Audrey McNeil (May 10)
Fallout From Panama Papers Echoes Around The World Audrey McNeil (Apr 05)

Inga Goddijn

Four cheap dark web threats, and how to protect your firm Inga Goddijn (Jun 30)
Mossack Fonseca Breach – WordPress Revolution Slider Plugin Possible Cause Inga Goddijn (Apr 11)
Cache Of 70, 000 Leaked OkCupid Profiles Taken Down Following Copyright Notice Inga Goddijn (May 19)
Another Day, Another Hack: 117 Million LinkedIn Emails And Passwords Inga Goddijn (May 19)
Hacking Team postmortem is something all security leaders should read Inga Goddijn (Apr 21)
Six Steps to Avoid Becoming a Data Breach Statistic Inga Goddijn (Jun 28)
Déjà vu Data Leaks Inga Goddijn (Apr 07)
Is your website or blog at risk from this ImageMagick security hole? Inga Goddijn (May 05)
Thieves hack W-2s of 1, 300 employees at Rockhurst University Inga Goddijn (Apr 13)
How to choose the right security solution for your business Inga Goddijn (May 05)
Six steps to avoid becoming a data breach statistic Inga Goddijn (May 26)
xDedic: What to Do If Your RDP Server Was Pwned Inga Goddijn (Jun 29)
When it comes to security standards, one size doesn't fit all Inga Goddijn (Apr 13)
Bangladesh Bank drops $81m cybertheft investigation due to cost of probe Inga Goddijn (Jun 28)
Japan: 100 ‘hackers’ steal nearly $13 million from convenience store ATMs Inga Goddijn (May 26)
Lack of BA Agreement Costs Clinic $750,000 Inga Goddijn (Apr 21)
Data Breach Highlight: Leading Law Firms Take A Hit Inga Goddijn (Apr 04)
Security 101 For SMBs Inga Goddijn (Apr 13)
Hackers behind Qatar National Bank set to leak data from 'another big bank' Inga Goddijn (May 05)
SWIFT Attacks: Hackers Strike Again Inga Goddijn (May 19)
HIPAA Enforcement Actions by the Numbers Inga Goddijn (Jun 30)
Tennessee Enacts Changes to Data Breach Statute Inga Goddijn (May 19)
Hard Rock Las Vegas suffers a second data breach Inga Goddijn (Jun 29)
3 Stolen Health Databases Reportedly for Sale on Dark Web Inga Goddijn (Jun 28)
Managing a Cyber Attack: How to Communicate to Customers Inga Goddijn (Jun 28)
Hackers charge big bucks for stolen Aussie creds Inga Goddijn (Apr 06)
Back at it Again (with Standing Opinions): Seventh Circuit Reiterates Article III Standing in Data Breach Class Actions Inga Goddijn (Apr 21)
Important Notice Regarding Amendments to Tennessee's Breach Notification Statute Inga Goddijn (Apr 06)
Trustwave Case Highlights Cyber-Risk to Professional Service Providers Inga Goddijn (Apr 06)
Top 8 Security Vulnerabilities Threatening Your SMB's POS System Inga Goddijn (May 05)
Hackers down House Democrats' websites Inga Goddijn (Jun 29)
Nebraska and Illinois Update Breach Notice Requirements Inga Goddijn (Jun 30)
Power Shell is a powerful malware tool Inga Goddijn (Apr 13)
Organisation: Know thy employees to detect and mitigate security risks Inga Goddijn (Apr 06)
Hackers broke into hospitals despite software flaw warnings Inga Goddijn (Apr 06)
Samsam Server-Side Ransomware Targets K-12 Schools, Hospitals Inga Goddijn (Apr 21)
Cerber Strikes With Office 365 Zero-Day Attacks Inga Goddijn (Jun 28)
Attackers Wrapping New Tools In Old Malware To Target Medical Devices Inga Goddijn (Jun 29)
How to Draft an Effective Data Breach Incident Response Plan Inga Goddijn (May 26)
Data Breaches: Are You Ready (for the inevitable)? Inga Goddijn (May 26)
Cyber security - increased challenges for institutions Inga Goddijn (Jun 30)
A disaster recovery plan: What is your IT team keeping from you? Inga Goddijn (Jun 30)