BREACH

Results: 2727



#Item
131Misconduct / Spamming / Crime / Computing / Cybercrime / Social engineering / Identity theft / Phishing / Computer virus / Computer security / Email spam / Email

THE FACTS: PHISHING AND SPEARPHISHING What is “phishing?” Email attack is the preferred method for many hackers. Verizon’s 2013 Data Breach Investigations Report found that “more than 95% of all attacks tied to s

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-15 15:31:42
132Security / Computer security / Cyberwarfare / Secure communication / Computer network security / Data security / Cybercrime / Data breach / Health Insurance Portability and Accountability Act / Vulnerability / Attack / Threat

Breach Prevention and Management: A HIPAA Perspective Nicholas P. Heesters, Jr., JD, CIPP HHS Office for Civil Rights

Add to Reading List

Source URL: www.ehcca.com

Language: English - Date: 2016-05-04 11:38:29
133Security / E-commerce / Secure communication / Cryptography / Computer security / Heartland Payment Systems / Payment Card Industry Data Security Standard / Data breach / Tokenization

The Voice of Georgia’s Restaurants Advocacy | Education | Awareness End-to-End Security, Not Just PCI Compliance, Will Keep Your Restaurant Safe 28 Sep:11 AM |Anonymous

Add to Reading List

Source URL: www.garestaurants.org

Language: English - Date: 2015-04-24 14:26:52
134Security / Secure communication / Prevention / Data security / Data breach / Identity theft / Electronic health record / Computer security / Health Insurance Portability and Accountability Act / Mobile device management / Information privacy / Mobile app

stethoscope on keyboard laptop

Add to Reading List

Source URL: downloads.cloudsecurityalliance.org

Language: English - Date: 2016-01-25 16:10:03
135Eicosanoids / Immunology / 5-Hydroxyeicosatetraenoic acid / Animal physiology / Cell signaling / Leukotriene / Pseudomonas aeruginosa / ALOXE3 / SCRIB / Lipoxin / Epithelium / Chemotaxis

Hepoxilin A3 Facilitates Neutrophilic Breach of Lipoxygenase-Expressing Airway Epithelial Barriers This information is current as of August 12, 2016.

Add to Reading List

Source URL: www.jimmunol.org

Language: English
136Secure communication / Data security / Data breach / Identity theft / Computer security / SafeNet / Medical data breach / Personal Data Privacy and Security Act

BREACH LEVEL INDEX ANNUAL RECAPTOP BREACHES BY TYPE

Add to Reading List

Source URL: breachlevelindex.com

Language: English - Date: 2016-08-03 15:31:24
137Flood control / Fluvial landforms / Riparian zone / Hydrology / Geotechnical engineering / Floodplain / Levee breach / Floodway / Levee / Fir Island / Flood / United States Army Corps of Engineers

Microsoft Word - ISYS QUERY FLOODWAY WEB PAGE.mht

Add to Reading List

Source URL: www.skagitriverhistory.com

Language: English - Date: 2007-10-24 02:07:47
138Health Insurance Portability and Accountability Act / Data security / Secure communication / Electronic health record / Data breach / Medical record / Medical privacy / Privacy / Health Information Technology for Economic and Clinical Health Act

From: To: Cc: Subject: Date:

Add to Reading List

Source URL: ouhsc.edu

Language: English - Date: 2016-04-28 10:00:21
139Secure communication / Data security / Data breach / Identity theft / Computer security / Personal Data Privacy and Security Act / Medical data breach

2014 Year of Mega Breaches & Identity Theft Findings from the 2014

Add to Reading List

Source URL: www.breachlevelindex.com

Language: English - Date: 2016-08-03 15:31:23
140Secure communication / Data security / Fraud / Identity theft / Data breach / Computer security / United States Office of Personnel Management / Identity theft in the United States / Anthem medical data breach

2015 The Year Data Breaches Got Personal

Add to Reading List

Source URL: breachlevelindex.com

Language: English - Date: 2016-08-03 15:31:23
UPDATE