Dark Web ID Trends:Top Source Hits: ID Theft Forum (100%)
Top Compromise Type: Domain (99%)
Top Industry: High-Tech / IT
Top Employee Count: 11 - 50 Employees (43%)
Technology companies come and go, but Bit by Bit backs its service with 30 years of experience helping businesses achieve their goals with reliable IT solutions and support. We were established in 1987 as a database application development and networking company, and since then we’ve evolved into a full-service IT firm and leader in delivering powerful and cost-effective technology solutions. visit our site at www.bitxbit.com
Thursday, February 7, 2019
United States - Black Rock
![]() |
Exploit: Database leak.
BlackRock: World’s largest asset manager and issuer of exchange-traded funds (ETFs). Risk to Small Business: 1.777 = Severe Customers Impacted: Over 12,000 advisers and sales representatives. >> Read full details on our blog. |
United States - Tampa Bay Federal Credit Union
![]() |
Exploit: Debit card spoofing.
Tampa Bay Federal Credit Union: Financial services provider. Risk to Small Business: 1.777 = SevereCustomers Impacted: Approximately 3,000, or 10% of all union members. >> Read full details on our blog. |
Dark Web ID Trends:
Dark Web ID Trends:Top Source Hits: Social Media (57%)Top Compromise Type: Email
Top Industry: Medical / Healthcare
Top Employee Count: 11-50 employees (47%)
Top Industry: Medical / Healthcare
Top Employee Count: 11-50 employees (47%)
Wednesday, February 6, 2019
Tuesday, January 29, 2019
Video: Consumers are catching on to the data value exchange game.
Video: Consumers are catching on to the data value exchange game.
Following the Cambridge Analytica scandal, Australia media company, Pureprofile, surveyed consumers to measure perceptions surrounding data use by organizations. Almost half (48%) were concerned about how their data was being used and intended to make changes to their privacy and sharing settings. Surprisingly, 26% of the Australian users surveyed decided to change or close their Facebook account.
When combined with other research on attitudes towards data use, it becomes clear that consumers are growing increasingly aware of the value exchange that occurs with online services, social media, and companies. However, they are not satisfied with how their data is being used and who exactly is using it, signaling a future paradigm shift in the way customers respond to data breaches.
Fostering trust with cyber vigilant customers begins by explaining how you are protecting their data. Consider highlighting your security solutions and outline how customer data is only being used when necessary, and with the intention of improving customer experiences to make their lives easier.
Subscribe to:
Posts (Atom)
-
Windows 10 End-of-Life: Why You Must Upgrade Now to Stay Secure and Compliant Microsoft has officially announced the end of support for Win...
-
What is SOC-as-a-Service? By Robert Blake Having a Security Operations Center (SOC) in-house is expensive for the average business. Large ...
-
In today’s digital-first world, non-profit organizations are under increasing pressure to secure sensitive data, streamline operations, and ...

