Privacy Principles

Privacy Principles

Imagine you’re not an employee of our company, and are instead a customer considering doing business with us. Wouldn’t you want to know that we were good stewards of your data? That we respected your choices and offered you control over your personal information? Of course you would—which is why we give our customers the…

information security

Five Immutable Laws of Information Security

An insightful “hacker’s view” of cybersecurity. RSA conference program chair Hugh Thompson, PH.D, recently introduced “Hackernomics,” a social science involving the description and analysis of attacker motivations, economics, and business risk, characterized by “five fundamental immutable laws.” At a recent RSA Conference, Dr. Hugh Thompson presented a “hacker’s view” summary of the dynamics of cybersecurity.…

Cyber Crime

Old Crime, New Tricks

Learn about the modern ways thieves steal credit card information. A survey released by ACI Worldwide reported that approximately 27% of all consumers have been victims of credit card fraud, with more than 1 in 10 victims experiencing fraud multiple times during a 5-year period. And a skimming scam was reported to be responsible for…

spyware

All Spyware – Nuisance or Threat?

Knowing what to look for can help keep your computer and our organization’s network safe from spyware. Spyware and other malicious software (malware) costs businesses billions of dollars. Spyware is a type of malicious software (malware) installed on computers and networks that collects information about you and our organization secretly. It’s called “spyware” because if…