You use Have I Been Pwned (HIBP) to check if your data has been compromised. What you do next when pwned takes a couple of steps.
Not everything on Facebook is a scam, thankfully, but there are some nasty ones that could potentially ruin the Yuletide season for you. Here are some tips on keeping safe.
In part 2 of our series on child identity theft, we examine the signs their PII might be compromised and how to reclaim your child’s identity if it is. We also list ways to protect their data and ID in the future.
It’s all too easy to discover data leaks online, especially in cloud services. We take a look at misconfigurations in elastic servers that lead to exposed data on the Internet.
Organizations are keen to protect the personal data of their employees and customers from cyberattack. But what about the data they no longer need? We discuss why data destruction is just as important to cybersecurity as protection.
Here are Labs’ top six takeaways from our data privacy and cybersecurity law series on corporate data privacy compliance. From emerging startups to burgeoning enterprises, these rules help not just with legal liability, but also user trust.