As part of Data Privacy Awareness Week, Ward and Smith is spotlighting the most common types of data breaches that businesses encounter. In Part 1, we explored the industries most vulnerable to cyberattacks, highlighting the...more
2/3/2025
/ Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Employee Training ,
Incident Response Plans ,
Phishing Scams ,
Ransomware ,
Risk Management ,
Social Engineering ,
Third-Party Service Provider
The FBI's Internet Crime Complaint Center (IC3) report sheds light on the growing threat of cybercrime, both nationally and within North Carolina. The state ranks among the top 15 in the U.S. for cybercrime complaints,...more
In today's digital landscape, the exchange of personal information has become ubiquitous, often without consumers fully comprehending the extent of its implications. The recent actions undertaken by the Federal Trade...more
The ongoing massive data breach in the world of advertising: real time bidding ("RTB").
You likely are, or have been, a target of RTB without your knowledge. The Irish Council for Civil Liberties ("ICCL") found that the...more
We live in an age where our digital footprint is forever preserved. Even before you think twice about it, your data has been collected and saved.
In fact, in 2020, it was estimated that nearly 2MB of data was generated...more
Data is king in today's digital economy. The estimated net worth of this global data market is forecast to hit nearly $235 billion by 2026, meaning collecting and sharing personal information is big business. ...more
Friday afternoon, reports surfaced that a foreign nation had compromised newly-discovered flaws in the Microsoft Exchange Server email software and breached the cybersecurity efforts of more than 60,000 known...more
For many companies, the "hap-happiest season of all" coincides with the busiest season of all. Business owners and employees are racing to fill customer orders in time for the holidays, which also means an avalanche of new...more
12/22/2017
/ Cyber Attacks ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Retention ,
Data Security ,
Encryption ,
Enforcement Actions ,
Federal Trade Commission (FTC) ,
Notice Requirements ,
Personally Identifiable Information ,
Popular ,
Privacy Policy