ANX Corporate Blog: Posts tagged as data breach
Showing 6 through 9 of 9 total posts
Feb 24th 2012, 10:31
The Increasing Cost of Non-Compliance
Welcome to another beautiful Friday! Let’s start off today with a fun fact.
This Day in History: February 24, 1955
"A young boy is born to University of Wisconsin graduate students Joanne Simpson and Abdulfattah Jandali. He is given up for adoption and taken in by a machinist and his wife in Mountain View, California. His name was Steve Jobs."
Data Breaches: The Expense That Keeps Rising
As many of you already know, the Online Trust Alliance (OTA) just released their latest report: The 2012 Data Protection & Breach Readiness Guide. This report highlights some interesting statistics from companies that experienced data breaches in 2011; the year fittingly dubbed as “The Year of the Data Breach”. Let’s take a look at
This Day in History: February 24, 1955
"A young boy is born to University of Wisconsin graduate students Joanne Simpson and Abdulfattah Jandali. He is given up for adoption and taken in by a machinist and his wife in Mountain View, California. His name was Steve Jobs."
Data Breaches: The Expense That Keeps Rising
As many of you already know, the Online Trust Alliance (OTA) just released their latest report: The 2012 Data Protection & Breach Readiness Guide. This report highlights some interesting statistics from companies that experienced data breaches in 2011; the year fittingly dubbed as “The Year of the Data Breach”. Let’s take a look at
Feb 17th 2012, 10:32
The Essentials of Encryption
“The ability to spread knowledge and inspire action are two of man’s greatest gifts” -Unknown
Welcome to the third installment of my data breach prevention/PCI compliance Tip of the Week blog series!
Recently, a very large software company has come under fire after discovering a data breach in one of its servers in India. The dissent this particular breach event has drawn is not rooted in how the attack was carried out, but in the lack of data security on those servers. The customer information that was taken in the data breach was stored in plain text. Sensitive customer information (including identifying and password information) was not encrypted. This company is not alone. The sad truth is that as more and more data breaches occur, the inadequate
Welcome to the third installment of my data breach prevention/PCI compliance Tip of the Week blog series!
Recently, a very large software company has come under fire after discovering a data breach in one of its servers in India. The dissent this particular breach event has drawn is not rooted in how the attack was carried out, but in the lack of data security on those servers. The customer information that was taken in the data breach was stored in plain text. Sensitive customer information (including identifying and password information) was not encrypted. This company is not alone. The sad truth is that as more and more data breaches occur, the inadequate
Feb 10th 2012, 08:02
Data Breach Prevention / PCI Compliance Tip of the Week
Happy Friday everyone! It's been another week in the trenches talking to merchants and corporations about PCI compliance and data breach prevention. I'm doing a weekly blog summarizing some key observations. My objective with this blog is to bolster knowledge, dispel myths, and spread valuable information on various topics within the PCI compliance realm.
Data Breach Prevention/PCI compliance Tip of the Week: Change your default passwords!
A stifling amount of large data breaches involving sensitive information center around a common and highly preventable mistake; not changing default passwords! This is one of the top methods of attack that hackers use to penetrate a network. In fact, password breach is consistently near the top of the list of data breach root
Data Breach Prevention/PCI compliance Tip of the Week: Change your default passwords!
A stifling amount of large data breaches involving sensitive information center around a common and highly preventable mistake; not changing default passwords! This is one of the top methods of attack that hackers use to penetrate a network. In fact, password breach is consistently near the top of the list of data breach root
May 18th 2011, 13:15
The increasingly high stakes of data breach notification
On Monday, May 16, President Obama released a strategy framework for cyberspace that stresses developing norms of responsible state behavior to promote a secure, open Internet. Of particular interest to me, was the likely trend of data breach notification. The drumbeat for simplification and standardization of state laws into a national law is intensifying. There’s already a dizzying array of different laws regarding data breach notification. Forty-seven state laws are in place today. There’s also an extensive docket of proposed state laws. States are delving into more and more aspects of data breach aftermath. For example, Hawaii has a proposed law that forces a business to pay for a person’s access