Spring4Shell Log4j vulnerabilities time Kaseya ransomware recovery REvil

Ask Chloé: Response Time Etiquette

Welcome to the Ask Chloé column on Security Boulevard! Each week, Chloé provides answers to readers’ questions to help guide them as they navigate the technology industry. This week, Chloé offers advice to an InfoSec ...
Security Boulevard
CISO Stories Podcast: Communications Before, During and After a Breach

CISO Stories Podcast: Communications Before, During and After a Breach

Figuring out what to do after a breach is the wrong time to start the planning process. Communications strategies must be in place well beforehand and there are many benefits to the ...
communications Collecting Non-Facebook Data

Is Facebook a “Party” to Capture of Offline Activity?

Facebook uses tracking plug-ins; bits of code that the consumer is unaware of, to track the behavior of users when they log out of the social media site, and which tells Facebook ...
Security Boulevard
Patient Engagement

HIPAA, Telehealth and COVID-19

The Department of Health and Human Services Office for Civil Rights (OCR) recently relaxed HIPAA enforcement: they won’t penalize providers who use tools for telehealth that are not HIPAA compliant. It makes ...

Are We Giving Up Our Privacy?

Every so often a tool takes off that suddenly everyone is using to communicate—one day it’s Google Hangouts, the next it’s Slack. Right now, that tool is Zoom, even though Skype and ...

5 Tips for Remote Work

In an effort to contain the Coronavirus, businesses are increasingly ordering employees to work from home. For many workers this transition can be challenging – only a third of employees in the ...

Controlling the Narrative

We live in an age where businesses are constantly on the alert for information leaks: consider the landmark Sony Hack to the recent Tesla emails. The challenge for businesses is staying in ...

Lessons from the Louisiana Ransomware Attack

When a ransomware attack hit the state of Louisiana this week, affecting some of the state’s server computers, the government responded by taking its servers down. The move was a pre-emptive one, ...
Incident Response

Five Tips for Rapid Communications When an Incident Hits the Water Distribution System

From natural disasters to oil and chemical spills to terrorist attacks to cyberattacks, water distribution systems have to be prepared for a variety of challenges that could contaminate or disrupt the water ...
5 Tips to Protect Your Reputation When a Crisis Hits

5 Tips to Protect Your Reputation When a Crisis Hits

These days crises like breaches, ransomware attacks and natural disasters have become all too common and businesses have to contend with keeping core operations running and addressing any reputation fallout that comes ...