Doesn’t it make sense to be proactive about data security and avoid a breach in the first place? If you answered yes, and we hope you did, here are some best practices to help keep your business and your data
1. MOVEit Data Breach (2023) What Happened: A vulnerability in the MOVEit file transfer tool allowed cybercriminals to exploit hundreds of organisations globally, leaking sensitive data. Victims included government bodies, banks, and healthcare providers. Lesson: Regularly patch and update software ...
We looked into how Target's data breach in 2013 happened, and what might have prevented it. Click here to find out what we learned.
In January 2025, the Dallas Independent School District (DISD) revealed acybersecurity incident involving PowerSchool, a vendor managing student data. The breach exposed personal information of students and staff, shedding light on the vulnerabilities educational institutions face when protecting sensitive d...
The reporting is always about the number of records stolen (3 million, 15 million, 140 million) and speculation on how it happened. Do you remember the Yahoo hack? That’s just part of a long list of successful breaches. Even the U.S. Government isn’t safe from a data breach. In ...
Data leaks are an overlooked attack vector that increase your risk of suffering a data breach. Learn what they are and how to shut them down quickly.
It may sound repetitive, but the worst time to prepare for a breach is after its happened. Having a robust IR plan in place – and ensuring it's been communicated to all stakeholders – is the best way to prepare for a worst-case scenario. The Post-Mortem After successfully responding...
Another week, another data breach. This time, it’s Ticketmaster’s turn. What has happened? Strictly speaking, it wasn't Ticketmaster that was the target, but one of its suppliers. The company said malicious software had infected a customer support product hosted by Ibenta Technologies, whic...
It may be tempting to only share data breach information to upper management or to staff on a need-to-know basis. But the entire company should be informed, as well as vendors and customers who might be affected as well. That said, they will freak out too, and have a lot of questions...
An advanced persistent threat (APT) is a sophisticated, sustained cyberattack in which an intruder goes undetected in a network to steal sensitive data.