In today's digital landscape, the exchange of personal information has become ubiquitous, often without consumers fully comprehending the extent of its implications. The recent actions undertaken by the Federal Trade...more
As the relentless march of technology continues, scams have evolved into cunning traps, presenting a challenge to individuals of all ages.
Among the great tapestry of age groups, despite the wealth of experience and...more
12/8/2023
/ Best Practices ,
Cybersecurity ,
Data Protection ,
Data Security ,
Enhanced Cybersecurity Services ,
Information Security ,
Internet ,
Mobile Devices ,
Passwords ,
Phishing Scams ,
Scams
The ongoing massive data breach in the world of advertising: real time bidding ("RTB").
You likely are, or have been, a target of RTB without your knowledge. The Irish Council for Civil Liberties ("ICCL") found that the...more
We live in an age where our digital footprint is forever preserved. Even before you think twice about it, your data has been collected and saved.
In fact, in 2020, it was estimated that nearly 2MB of data was generated...more
A Ward and Smith attorney, Information Technology professional and Privacy Officer outlined a variety of best practices and tips for businesses dealing with data security and privacy issues.
The webinar, one in a series...more
Privacy and Data Security is the body of law that addresses how an organization can collect, handle, and use personally identifiable information and how that information needs to be protected.
Community Associations quite...more
Friday afternoon, reports surfaced that a foreign nation had compromised newly-discovered flaws in the Microsoft Exchange Server email software and breached the cybersecurity efforts of more than 60,000 known...more
The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the U.S. Department of Health and Human Services (HHS) are aware of an increased cybersecurity threat to hospitals...more
For many companies, the "hap-happiest season of all" coincides with the busiest season of all. Business owners and employees are racing to fill customer orders in time for the holidays, which also means an avalanche of new...more
12/22/2017
/ Cyber Attacks ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Retention ,
Data Security ,
Encryption ,
Enforcement Actions ,
Federal Trade Commission (FTC) ,
Notice Requirements ,
Personally Identifiable Information ,
Popular ,
Privacy Policy