Remove Blog Remove Consumer Protection Remove Data breaches
article thumbnail

National Consumer Protection Week: Keeping your personal data safe in a digitally connected world

Webroot

March is a time for leprechauns and four-leaf clovers, and as luck would have it, its also a time to learn how to protect your private data from cybercrime. Each year, the first week of March (March 2-8) is recognized as National Consumer Protection Week (NCPW).

article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

In this blog, I’m exploring these changes, grouped under key categories that I’ve used in previous years, to help business leaders and cyber risk owners better prepare for the evolving landscape. Insider Threats as a Growing Concern Insider threats represent one of the most underestimated vectors in this evolving landscape.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Non-Bank Financial Firms Are to Report Breaches in Less Than 30 Days

Heimadal Security

Federal Trade Commission (FTC) requires all non-banking financial institutions to report data breaches to FTC within 30 days. The amendment to the Safeguard Rule refers to security incidents that impact more than 500 people.

Banking 105
article thumbnail

GUEST ESSAY: A primer on best practices for automating supply chain cybersecurity

The Last Watchdog

They point out how supply chains rely on software yet lack the security tools to protect them. Data breaches exposed over 37 billion records in 2020 alone — a 141% jump from 2019. Businesses must automatically secure their supply chains to protect themselves and comply with consumer-protection laws.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

In this blog, we will explain the unique data security challenges for Telcos and three ways how both Thales and Red Hat can help them protect against future API attacks. Over the past year, the Telecom industry has suffered some massive, high-profile data breaches — all of which happened by exploiting unprotected APIs.

article thumbnail

It’s a Holiday Security Breach Blowout

SiteLock

It’s a heartwarming tale of multiple mass data compromises, which affected yours truly. We’ll also discuss how major data breaches occur, and what you can do to protect yourself in the Age of the Large Data Breach. How Website Security Breaches Occur. Last week was special.

article thumbnail

Cybersecurity Report: June 29, 2015

SiteLock

US to Raise Breach of Government Records at Talks with China. This Monday, The United States began the annual security talks with China and an official said that the US government representative would raise directly the major data breach at OPM during the discussion. Follow the SiteLock blog for the latest cybersecurity news.