November Breach Report

by Sarah Harvey / December 15, 2022

Every month there is headline after headline reporting about new data breaches. Whether it’s a ransomware attack, a negligent employee opening a phishing email, or a state-sponsored attack, millions of individuals are impacted by data breaches and security incidents on a regular basis. Let’s take a look at some of the top data breaches that occurred during November, how hackers compromised these organizations, and the lessons we can learn from…

CCPA Compliance and Your Marketing Team

by Sarah Harvey / October 4, 2023

CCPA Implications for Marketing It’s no secret that digital marketing is undergoing a major transformation – one that is centered on giving consumers more autonomy over the way their personal information is collected, used, stored, sold, and transmitted. Last year, we saw how the EU’s General Data Protection Regulation changed the international landscape of marketing, and 2020 will be the year the US really feels the brunt of the data…

Why Bother with an Information Security Program?

by Sarah Harvey / June 15, 2023

When headlines about companies like Capital One, Imperva, Marriott, Target, or Home Depot becoming victims of a data breach are released, we understand why small and medium size businesses start wondering if their efforts put towards an information security audit are worth it. If enterprise-level companies and household names can’t protect themselves, why should startups and smaller companies even try? If they can’t do it, no one else can either,…

Most Common SOC 1 Gaps

by Sarah Harvey / June 13, 2023

If you knew a hurricane or car accident was going to happen, wouldn’t you do your best to prepare for it? You’d want to know every detail of its likelihood so your plan of action would prevent as much damage as possible. The same principle applies to information security breaches - that’s why it’s important for your organization to be aware of and remediate common security gaps so you can…

Think Like a Hacker: Common Vulnerabilities Found in Wireless Pen Tests

by Sarah Harvey / February 20, 2023

Common Ways Wireless Devices, Applications, and Networks are Exploited From hand-held wireless devices to wireless networks, your organization probably depends on the convenience and accessibility of wireless devices to conduct business - but wireless devices are just as likely as any other technology to be compromised by hackers. Do you know what vulnerabilities your wireless devices, applications, and networks are up against? In this short webinar, KirkpatrickPrice expert pen tester,…