Deceptions Everywhere ®

Insights on threat and cyber risk trends, use cases for deception technology and strategies for combatting targeted attacks

Beef Up Data Security & Personal Data Privacy For GDPR

The intersection between cybersecurity and data privacy is making front-page news these days. The General Data Protection Regulation (GDPR), adopted by the European Union in 2016 and implemented in May 2018, represents a comprehensive regulatory effort with the objective of protecting consumer data and privacy. Organizations, or “controllers” of data in the language of the laws, must put in place “appropriate technical and organisational measures” to implement the data protection principles. There have been other legislative efforts in recent years dedicated to consumer data protection - the Dodd–Frank Wall Street Reform and Consumer Protection Act in the U.S. being one of them (though some of those regulations have since been removed or eased), but GDPR has been the most extensive. Read More

4 Quick Thoughts On The Marriott Breach: Not A Usual Crime

My phone’s been ringing this morning from people wanting to talk about the massive Marriott breach — the revelation that private data associated with up to 500 million people may have been compromised. I’m sure there’s a lot more to learn from the details, but in the meantime, I’ll take a quick minute to jot down some initial thoughts: Read More

What Actually Happens After a Data Breach?

When yet another headline about a large-scale data breach scrolls across your newsfeed, you might worry about the security of your company and hope it doesn’t happen to you. But after the initial shock of a breach, most people stop thinking about it.

Read More

The 4 types of cyber attackers & their complete profiles.

Cyber security was pretty simple back in the 1990s. Anti-virus software and firewalls offered plenty of firepower to combat attacks that were more annoying than dangerous. But that world is gone. Cyber Attackers exist on a spectrum now and they have ever since the Love Bug virus hit the scene in 2000, stealing some $10 billion from 20 different countries. Read More

Cyber Crime Vulnerabilities Across 4 Major Industries

You don’t need a long report to tell you that cyber crime is on the rise. You’ve seen the news—major companies like JP Morgan Chase, Anthem, LastPass, CVS and more have all fallen victim to data breaches in 2015.

The truth is that any company harboring sensitive customer information could become the target of a sophisticated cyber attacker.

That being said, there are certainly industries that are more vulnerable to attacks. Let’s take a closer look at four of the most vulnerable industries—financial services, healthcare, insurance and retail.

Is It Easy for Cyber Criminals to Get Away From The Law?

Businesses of all size have their hands full with the 80 to 90 million cyber attacks that are launched every year. However, with 70% of these attacks going undetected, it shouldn’t come as a surprise that most cyber crime goes unpunished.

Read More

CSI: Cyber | Real Professionals Bash The Unrealistic Plot

This past summer, Mr. Robot made its television debut to rave reviews from the cyber security community for its technical accuracy. Yet, there was another cyber security show that debuted earlier in 2015—CSI: Cyber.

Read More

5 Biggest Cybersecurity Investments You Should Make Today

If you’re not a lawyer, then digging into legal precedent isn’t very exciting. What’s even less exciting is suffering a major data breach and having to deal with the legal consequences.

Read More

How Do Data Breaches Happen? | The Full Anatomy In 6 Steps.

Cyber criminals do plenty of research on your company, so isn’t it time you return the favor, and find out what makes them tick before a data breach occurs? Read More