Staying aware of threats is part of any good crisis management plan Social logins, where you use your Facebook, Twitter, Google or other social media accounts to log into apps and platforms around the web, have quickly become a norm. After all, with the mile-long list of passwords and key …
CurrentC Needs Crisis Management after Data Breach
Losing trust before you get off the ground can be devastating Mobile payment is a hot field right now, and it looks like whoever comes out as the clear favorite is going to reap serious benefits. One newcomer to the field, CurrentC, has already encountered a major hurdle in the …
Crisis Management Dangers in “The Cloud”
Should you be trusting cloud storage with valuable data? Storing data in “the cloud” has become enormously popular, yet a lack of understanding about exactly what is okay to store there, and how secure cloud services are, has led to massive security threats becoming commonplace. We would even go so far …
Crisis Management Risk – Smartphone Shipped with Spyware
Data thieves find a new angle of attack The message that downloading suspicious apps can land with you a phone full of malware is finally gaining ground, but what if your phone comes straight from the factory with nasty software already installed? Well, if you ordered a Star N9500 Android …
Analyzing P.F. Chang’s Crisis Management for Data Breach
Was the popular chain’s crisis management a four-star effort? The data breach at P.F. Chang’s came to light in mid-June of this year, with the organization claiming to have learned of the situation June 10. Crisis management started out in troubled waters when a massive number of news organizations and …
Antivirus Maker’s Crisis Management for Data Breach
More proof that nobody is invulnerable to cyber attacks In the last Crisis Manager of 2013, we predicted cyber crises would explode this year, and explode they have. What was once a fringe crime that often went unnoticed by both victims and the media has become big business, and it …
- Page 2 of 2
- 1
- 2