Similar Articles |
|
CIO January 2007 |
Data Breaches Cost You More Data breaches continue to become more expensive. |
InternetNews March 9, 2011 |
Data Breach Recovery Getting More Expensive Report says the cost enterprises have to pay to fix security and restore operations after a data breach continue to grow. |
InternetNews February 2, 2009 Richard Adhikari |
Study: Negligence Causes Most Data Breaches A just-released study concludes that the cost of data breaches to businesses is rising from both internal negligence and the actions of third parties. |
InternetNews April 27, 2011 |
Alliance Data Systems Acquires Aspen for $345 Million Alliance Data's Epsilon division will grow analytics and marketing platform with Aspen buy. |
Wall Street & Technology December 12, 2007 Melanie Rodier |
Data Breaches Costly For Financial Firms Data breaches are costly for any company, but according to a 2007 study, the average total cost for an incident is much higher in the financial sector. |
InternetNews April 28, 2010 |
Data Breaches Dent U.S. Corporate Coffers Regulations requiring U.S. companies to notify customers when their data has been compromised is taking its toll on corporate bottom lines. |
InternetNews January 7, 2011 |
ITRC Seeks Full Data Breach Disclosure With major data breaches on the rise, the Identity Theft Resource Center is urging the formation of a centralized, searchable repository for the public to keep track of what institutions have seen their information compromised. |
InternetNews January 26, 2010 |
Average Cost of Data Breach $6.75m in 2009 New study from Ponemon Institute and PGP Corp. shows rising costs for businesses associated with data breaches. |
Insurance & Technology February 6, 2008 Melanie Rodier |
Data Breaches Increasingly Costly, Especially in Financial Services As the number of data breaches reported annually continues to surge, the costs incurred by companies that report incidents also are increasing |
InternetNews January 21, 2009 Richard Adhikari |
Cyber Thieves Hit Payment Processor Heartland Experts warn that more attacks may be to come. Observers also say the breach highlights the current state of legislation regarding disclosure when data loss hits corporations. |
InternetNews March 17, 2006 Roy Mark |
Groups Slam Data Breach Notification Bill A U.S. House panel effort to write a national data breach disclosure law is running into fierce opposition by consumer groups calling the legislation the "worst data security bill ever." |
InternetNews February 4, 2011 Stuart J. Johnston |
Hotmail Adds Support for Multiple Aliases Microsoft gives users of its free online email system "aliases" so that they can have disposable email addresses. |
InternetNews January 28, 2009 Richard Adhikari |
Monster Breach Shows Security Needs Rethinking Is corporate security fighting yesterday's war with last decade's weapons? |
InternetNews June 18, 2009 Alex Goldman |
The Offline Vulnerability of Personal Data Organizations cannot substitute technology for common sense in the handling of personal information, warns a new report. |
InternetNews July 10, 2009 Alex Goldman |
Calif. Heath Firms Claim 800+ Breaches in 2009 New laws prompt an overwhelming number of reported incidents of inappropriate data access. |
Fast Company John Paul Titlow |
After A Hack, Slack Adds Two-Factor Authentication -- Is That Good Enough? The fast-growing enterprise chat startup confirmed today that its database was breached in February and that the intruder had access to the names, email addresses, and encrypted passwords of Slack users. |
InternetNews December 9, 2010 |
Hackers Zero In On Employee Email Accounts Lost or stolen laptops and USB drives are a serious security threat but personal email accounts are becoming an even bigger target for cybercrooks. |
InternetNews July 10, 2007 Roy Mark |
Many Breaches, Few ID Thefts Data breaches are frequent, but evidence of actual identity theft resulting from the breaches is limited, according to a new report by the General Accountability Office. |
InternetNews September 17, 2010 |
Rice University Deals With New Data Breach A stolen device containing student and faculty data went missing, putting personal information including Social Security numbers and birth dates up for grabs. |
CRM May 2011 Barton Goldenberg |
Three Cheers for Honest CRM Vendors Dishonest practices that over-promise and under-deliver must be rooted out. |
InternetNews November 28, 2007 Andy Patrizio |
Report Details Real Costs of Data Breaches Some experts say breaches aren't just an embarrassment to your IT department: They're a leech on the bottom line. |
InternetNews May 26, 2006 Clint Boulton |
Sacred Heart Data Hacked Sacred Heart University became the latest school to fall victim to a computer hack, which exposed the personal information of as many as 135,000 students and alumni. |
InternetNews July 13, 2009 |
Report: 85 Percent of U.S. Businesses Breached A new report has a recommendation for organizations that fear a breach and the reporting requirements that go with it. |
InternetNews January 12, 2007 Roy Mark |
Data Breach Law Back in Senate Businesses and government agencies would have to notify consumers under certain circumstances of data breaches under legislation introduced by U.S. Sen. Dianne Feinstein. |
The Motley Fool April 28, 2011 Dayana Yochim |
Aaack! My PlayStation's Been Hacked! Sony's massive leak of customers' private information from the PlayStation Network is a reminder that you should watch for signs that you've been the victim of identity theft. If you are a victim, what should you do? |
Bank Systems & Technology November 6, 2008 Orla O'Sullivan |
2008 Data Breaches: 30 Million and Counting Roughly 30 million consumers have had sensitive personal data stolen in the 552 reported data breaches so far in 2008. |
InternetNews April 8, 2011 |
Say What? Top Five IT Quotes of the Week Google defends Android... Linux turns 20... The U.S. Government strikes back at Verizon... etc. |
CIO February 15, 2002 Abbie Lundberg |
Response Ability How do you respond to a computer security incident? |
CRM October 2, 2013 |
Experian Releases Email Insights A new product turns inactive email subscribers into active customers again. |
IEEE Spectrum August 2008 Prachi Patel-Predd |
Data Theft by Partner Companies on the Rise Data breaches involving trusted third parties -- business partners, vendors, suppliers, and contractors -- are alarmingly on the rise, according to a recent investigation by the security team at Verizon Business. |
Bank Systems & Technology November 20, 2008 Orla O'Sullivan |
Best Practices on Data Breaches The task of informing consumers of a breach falls on banks. How the institutions do that is key to how they will be perceived by their customers. |
Wall Street & Technology June 18, 2007 Melanie Rodier |
US Businesses Still Lack Adequate Security to Protect Client Information Study shows 85% of midsize to large businesses spanning all industries reported data security breach, mostly due to stolen equipment. |
InternetNews January 12, 2006 Roy Mark |
Data Breaches: New Year, Old Story Data breaches are off to a flying start this year. Congress does nothing about it, not even requiring companies to inform consumers of the breaches. |
InternetNews August 9, 2010 |
New Federal Data Breach Bill Debuts in Senate The new bill is getting early support from prominent Democrats and could require enterprises meet tighter security measures and new notification rules. |
CFO May 15, 2012 David Rosenbaum |
Costs of Data Breaches Drop In March, the Ponemon Institute, an independent research center that examines privacy, data protection, and information-security policies, reported the first decline in at least seven years of both the organizational cost of data breaches and the cost per lost or stolen record. |
IEEE Spectrum July 2011 Robert N. Charette |
More Cyberattacks or Just More Media Attention? We've failed to take cybersecurity seriously. Now we're paying the piper |
CRM October 2013 Maria Minsker |
Marketing Email Open Rates Jump Nearly a third of marketing emails are viewed -- a major increase compared to recent years. |
CRM September 7, 2012 Dale Dabbs |
Protect Your Most Valuable Business Assets--Your Customers Optimal CRM incorporates data protection best practices to curtail identity theft. |
InternetNews December 20, 2005 Jim Wagner |
Guidance Software Investigating Stolen Data Computer forensic specialist Guidance Software found itself on the receiving end of a malicious hacking attack that managed to swipe sensitive information on reportedly thousands of customers. |
Wall Street & Technology October 23, 2007 Melanie Rodier |
How Are U.S. Businesses and Lawmakers Responding to Data Breaches? Nearly 77 million individuals have been affected by data breaches so far this year. But even after suffering a data breach, many businesses failed to implement encryption solutions or seek legal counsel. |
InternetNews April 8, 2011 |
Rapid7 Accelerates Security with NeXpose New release of NeXpose 4.11 security solution includes new database architecture and expanded capabilities. |
CRM May 2015 Leonard Klie |
Data Security Should Be in Everyone's Job Description Protecting valuable customer information should begin in the contact center and end in the executive suite. |
AFP eWire December 6, 2004 |
Email Solicitations Still Evolving in Higher Education Only half of higher education institutions are using email as a fundraising tool, and there is a wide disparity in how the technology is being employed, according to a new survey by the Council for Advancement and Support of Education (CASE). |
U.S. Banker June 2007 Rebecca Sausner |
Cyber Security: Insurance Not Standard Yet, But Choices Abound Typical policies now offer a range of protections, as data breaches become more problematic. But at what point should premiums be spent instead on shoring up security? |
InternetNews June 9, 2009 Alex Goldman |
T-Mobile Hacked? Although a blog reported yesterday that T-Mobile was hacked, all the hackers actually seemed to have was a list of T-Mobile server names. |
CRM January 19, 2015 Maria Minsker |
Cybersecurity Is Not Just About Protection, but Detection Too Enterprises must prepare to tackle inevitable breaches in 2015. |
CIO April 27, 2009 Karl A. Hochkammer |
Plan an Outsourcing Deal's End at Its Beginning Plan ahead to ensure a successful exit for you and the vendor. |
InternetNews September 25, 2007 Stuart J. Johnston |
Report: TJX Security Was 'Inadequate' TJX is faulted for collecting too much information, keeping it too long, and not upgrading security systems quickly enough. |
CRM March 2010 Christopher Musico |
Email Management You've Got Mail: Despite fits and starts, many still believe email management solutions can deliver on their promise. |
InternetNews August 25, 2006 Michael Hickins |
Education Department Flunks on Security The Department of Education suffered an embarrassing breach over the past weekend when a site used to reimburse student loans allowed unauthorized access to the personal data of tens of thousands of registered users. |