data breach

Results 426 - 427 of 427Sort Results By: Published Date | Title | Company Name
Published By: Darktrace     Published Date: Jun 21, 2019
Cyber security is today an unavoidable concern for law firms and the legal sector at large, which oversees disproportionately large volumes of sensitive data and which is therefore an attractive target for sophisticated threat actors. From confidential information about mergers and acquisitions to disclosures made under attorney-client privilege, todayís law firms are inundated with data that would be disastrous if leaked, both for the results of individual cases and for these firmís long-term reputations. Indeed, this reputational damage diminishes the very trust upon which the legal profession is predicated, jeopardizing client relationships and hindering customer acquisition. Legal organizations lose 5% of their clients following a data breach, while significant or high-profile breaches can even prompt a firmís eventual collapse, as was the case for Mossack Fonseca in the infamous Panama Papers breach. In todayís increasingly digital business world, even the most private legal docum
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 21, 2019
Cyber-attacks targeting technology and telecommunications firms represent the most significant threat to their sensitive customer data and invaluable intellectual property. When successful, such attacks cost these firms dearly, not only in terms of immediate loss of revenue but also in the form of subsequent reputational damage. Technology firms that provide digital services or house vast quantities of user information are particularly at risk, as demonstrated in the Uber breach that exposed the personal information of more than 25 million users. Regulations around personal data, such as GDPR, increasingly require technology firms to adopt a robust cyber defense strategy that can detect cyber-threats at an early stage. Cyber-attacks aimed at technology firms with lucrative IP have also become a fact of life in the Information Age. Often perpetrated by nation-state actors with advanced capabilities, these attacks are now remarkably subtle and stealthy, with some of the latest examples b
Tags : 
    
Darktrace
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18     Next   End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.