How to Send Breach Notifications

It has happened. Despite the annual security training. Despite the investment in cyber security. Cybercriminals breached your systems and stole your customers’ information. What do…

MORE Law Enforcement Response

Send Breach Notifications

How to Send Breach Notifications

It has happened. Despite the annual security training. Despite the investment in cyber security. Cybercriminals breached your systems and stole…

Breach Notification Basics

Data breaches are becoming worryingly common. According to the Identify Theft Resource Center, there were 817 data breaches in the…

Part Three: How to Establish Quality Control

You’ve set up your Law Enforcement Response Program (using tips from Part 2 of our blog series). You’ve trained your…

Part Two: A Standardized Law Enforcement Response Program

As we discussed in Part One, there are a lot of external pieces to consider when you receive a data…

gavel with law books

Part One: Law Enforcement Requests Overview

Does your company handle customer data? If so, there’s a chance you have received a Law Enforcement request for data,…

gavel and laptop

Data Privacy Laws and Their Contributions

The acceleration of the digital era has led to many benefits. New and exciting medical treatments are available. Learning platforms…

binary data

Cybercrime 101: A Brief Introduction

In today’s world, cybercrime is quite common. And it’s expected to continue rising at unprecedented rates.  In fact, every American…

red broken heart

All You Need Is Love (All They Want Is Your Wallet): A Brief Review of Online Romance Scams

Perhaps no tenet of the human experience has inspired greater artistic expression than the concept of romantic love. Humans often…