personally identifiable information
California adds biometric specs to data breach law
California is changing its Information Practices Act of 1977 to expand the definition of personal information with additional identifiers, including biometric data of those affected. The amendment comes with new instructions on ...
Make Digital ID Verification Part of Your CCPA Strategy
As CCPA is poised to take effect, companies must ensure they don’t put personal information in the wrong hands The lines between the digital and physical world are continuing to blur and ...
Your Personally Identifiable Information Is Part of You: Stop Giving It Away
Are hackers really the problem when governments can just ask for or legislate the requirement to turn over user data? Russia currently has approximately 149 million people living in within its borders, ...
Think Your Business Is Too Small to Get Hacked? Wake Up!
Sixty percent of small- to mid-sized businesses (SMBs) go bankrupt six months after suffering a cyberattack. The risk is simply too great. SMBs need to strengthen their digital security. Uber…Equifax…Yahoo…if you look ...
It’s Beginning to Look a Lot Like Christmas, with Cyberattacks Lurking in Every Data Store
Based on the holiday song, “It’s Beginning to Look a Lot Like Christmas,” by Meredith Willson It’s beginning to look a lot like Christmas Everywhere you go Take a look at emails ...
Dark Patterns: Stealth Ways Companies Collect Personal Data
Security experts and security writers talk a lot about how sophisticated cybercriminals are at getting the information they want. But what we don’t talk enough about is how well legitimate companies are ...
Data Security Spotlight: Protecting Electoral (and Everyday) Data
Intelligence is key to data security in an age where data breaches have gone mainstream Did you vote on Tuesday? Or, were you part of the “nearly one in five Americans” who ...
Information Risks of Travel
So, you’re on the road for work again, are you? Or, you’re heading out soon? Regardless of when, if you travel for work you should know about the information risks of travel ...
Overcoming the Shadow IT Catch-22
Trying to prevent shadow IT from sweeping through your organization is like trying to protect your sand castle from the waves when high tide rolls in—it can’t be done. Employees expect to ...
The Internet of Things (IoT) and Digitally Stored PII: Avoidable or Inevitable?
The Internet of Things (IoT) is rapidly showing up in all facets of daily life and collecting personally identifiable information (PII) in massive quantities. From smart home thermostats to one-click purchasing, IoT devices ...
