You might think this is obvious, but just in case it is not, California wants to make this clear. It used to be, in California, that if you had sensitive data encrypted and that data was stolen, you didn’t have to tell people because, after all, it was encrypted. But there is a rub with […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We often tell you about web sites that use your data and sometimes in ways that you don’t expect, but usually it is to sell it to advertisers. However, apparently, AT&T has created a new revenue stream. AT&T calls the program Project Hemisphere. Hemisphere is a program which allows law enforcement to search AT&T call […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While the Cloud has an amazing number of advantages, it is important to remember that it is hard to see inside a cloud and what you can’t see could hurt you. I was recently involved in responding to a potential email compromise where the company was using cloud based email. While this cloud based email […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Whenever I read the news that a data breach has occurred, my first two questions are “how big is it?” and “How long did it go for”. For example, the Omni Hotel chain announced a breach this week and they said it affected 49 out of their 60 hotels, affected 50,000 customer cards, was detected […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Compliance is one of those challenges for companies big and small. One of those compliance requirements is to keep abreast of changes to or new laws that apply to your organization. While we don’t offer legal advice, when we see items related to compliance, we will bring them to your attention. In the case of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]