FEATURED ARTICLE
How to Send Breach Notifications
It has happened. Despite the annual security training. Despite the investment in cyber security. Cybercriminals breached your systems and stole your customers’ information. What do you do now? You’ll have to secure your network and determine which data may have been breached. But after you’ve shored up your systems, there’s…
Law Enforcement Response |
Breach Notification Basics
Data breaches are becoming worryingly common. According to the Identify Theft Resource Center, there were 817 data breaches ...
Read More IPS |
Community Engagement in 2022
Community engagement has always been a big part of our culture at IP Services. That’s why we formed ...
Read More Law Enforcement Response |
Part Three: How to Establish Quality Control
You’ve set up your Law Enforcement Response Program (using tips from Part 2 of our blog series). You’ve ...
Read More Law Enforcement Response |
Part Two: A Standardized Law Enforcement Response Program
As we discussed in Part One, there are a lot of external pieces to consider when you receive ...
Read More Law Enforcement Response |
Part One: Law Enforcement Requests Overview
Does your company handle customer data? If so, there’s a chance you have received a Law Enforcement request ...
Read More Fraud Prevention |
The Real-World Value of In-Game Currency
When it comes to digital goods, Friendly Fraud isn’t the only concern merchants should have. While industry estimates ...
Read More Fraud Prevention |
Gaming Leaks 101: The How and Why
Yoda once said, “Patience you must have, my young padawan.” It is safe to say that gamers in ...
Read More Law Enforcement Response |
Data Privacy Laws and Their Contributions
The acceleration of the digital era has led to many benefits. New and exciting medical treatments are available. ...
Read More