Child identity theft, part 2: How to reclaim your child’s identity

In part 2 of our series on child identity theft, we examine the signs their PII might be compromised and how to reclaim your child’s identity if it is. We also list ways to protect their data and ID in the future.

Read more

Child identity theft, part 1: On familiar fraud

In this two-part series on child identity theft, we shed light on the growing problem of familiar fraud, where those entrusted with a minor’s information are the very ones who abuse it.

Read more

Business in the front, party in the back: backdoors in elastic servers expose private data

It’s all too easy to discover data leaks online, especially in cloud services. We take a look at misconfigurations in elastic servers that lead to exposed data on the Internet.

Read more

How to protect yourself from doxing

Doxing, or collecting and spreading private information about a user online, is a form of cyber harassment, stalking, and even a potential threat to physical safety. Here’s what you can do to protect yourself against it.

Read more

What role does data destruction play in cybersecurity?

Organizations are keen to protect the personal data of their employees and customers from cyberattack. But what about the data they no longer need? We discuss why data destruction is just as important to cybersecurity as protection.

Read more

How much personalization is too much?

Personalization is the new mantra of marketers—and most people are perfectly okay with that. But when does personalization cross the line into invasive? And what can uncomfortable consumers do about blocking it?

Read more

The top six takeaways for corporate data privacy compliance

Here are Labs’ top six takeaways from our data privacy and cybersecurity law series on corporate data privacy compliance. From emerging startups to burgeoning enterprises, these rules help not just with legal liability, but also user trust.

Read more

What is personal information? In legal terms, it depends

What exactly is the “personal information” that companies need to legally protect? Learn which data points organizations need to secure, from Social Security numbers to olfactory, smell-based data (!), to comply with the law.

Read more

Reputation management in the age of cyberattacks against businesses

A business’s reputation takes years to build. With the current climate of data breaches, destroying it can take only seconds. What can businesses do to protect their brands from fallout following a cybersecurity incident? We answer these questions and more.

Read more

2018: The year of the data breach tsunami

To get a sense of the grim state of data security today, take a look at this infographic from TruthFinder that explains why 2018 was the year of the data breach tsunami.

Read more

Select your language