FEATURED ARTICLE

How to Send Breach Notifications

It has happened. Despite the annual security training. Despite the investment in cyber security. Cybercriminals breached your systems and stole your customers’ information. What do you do now? You’ll have to secure your network and determine which data may have been breached. But after you’ve shored up your systems, there’s…

Read More
Data protection concept

Privacy in the Digital Age: The Issues

In the digital age, we are always on our phones, tablets and computers. There are cameras everywhere. In ...
Read More
Stack of credit cards

The Hidden Costs of Chargebacks

As a society filled with online shoppers, we have grown accustomed to having all our wants and needs ...
Read More
medical devices and heart transplants

The Six Million Dollar Heart

... or is it? In other posts, we talked about the dangers of counterfeit pharmaceuticals and automotive parts, ...
Read More
Work environment with employees

5 Inclusive Team Communication Methods

You can’t get through life without being on a team at some point whether it is a sports ...
Read More
Fake watches

Brand Protection: A Walk-through

You find a high-end watch for sale online and the price is relatively cheap. You must have stumbled ...
Read More
Gift of Giving and community outreach

Over a Decade Later: A Tradition of Giving

At the heart of most traditions are three things: people coming together, a celebration of what matters, and ...
Read More
Team Discussion at the office

A Successful Fraud Team Knows How to Answer These Three Questions

The case for building and maintaining a fraud team is quite simple: each year billions of dollars of ...
Read More
Clothing tag

Protect Yourself – Counterfeits are Dangerous!

Do you shop online? If you’re like most Americans, the answer is a resounding “Yes!” In fact, depending on ...
Read More