Data Breach/ID Theft

Different Types of Security In Records Management

Security threats in records management come from all directions ranging from malware and data breaches to theft, fire, or flood, making it essential to incorporate multiple types of security in records management. In this video you’ll learn more about why using multiple security strategies is important, where top security...

The Data Breach Case Study & Protection Guide

Even the tiniest security gap can lead to a data breach. After a $5.5 million settlement, Nationwide Insurance’s breach serves as just one example of the growing number of data breaches each year—making it all the more important you have protections in place.  What Happened Even the tiniest...

Low-Tech Hacks: Is Your Business in Danger?

Estimates suggest that approximately 15 million Americans have their identities used fraudulently each year, which equals roughly 7% of the adult population. Data breaches of epic proportions are constantly making headlines. Large companies, such as Target, Yahoo, and even the federal government get hacked, and individuals across the U.S....

Learning From The Historical Yahoo Data Breach

Data breaches happen a lot more often than anyone likes to hear. It’s hard to determine if data breaches are completely unavoidable, but there are ways to secure your company to make it harder for hackers to get in, or if they do, they can’t do as much damage. ...

Password Hacks: How to Create a Strong Password

Passwords have been our primary source of security since the beginning of the digital age, and their origins can be traced back to ancient times. As technology progresses, hackers with malicious intent find new ways to crack passwords and steal information. As society delves deeper into the digital world...