Teresa RothaarinThe StartupIs Your Privacy Policy Compliant with the CCPA?Use this checklist to make sure you’re on the right side of California’s data privacy lawJan 20, 2020Jan 20, 2020
Teresa RothaarinThe StartupBe on the Lookout for Business Email Compromise ScamsCompanies are losing billions to business email compromise scams. Here’s how to recognize BEC before you fall victim.Jul 25, 2019Jul 25, 2019
Teresa RothaarinThe Rothaar ReportBuckle Up, Defense Contractors: Tighter Cybersecurity Standards Are ComingIn theory, U.S. government contractors should be very secure, especially those working for the Department of Defense (DoD). The majority…Jul 22, 2019Jul 22, 2019
Teresa RothaarinThe StartupPassword Reuse Is Fueling an Epidemic of Credential StuffingOnline retailers, banks, hotels, and airlines have been struggling with a tidal wave of credential stuffing, with this form of cyberattack…Jun 18, 2019Jun 18, 2019
Teresa RothaarinThe StartupThe Cybersecurity Mistakes Your Employees Are Probably MakingWe’ve all gotten a laugh out of photos on Instagram and other social media networks where the photographer obviously forgot to remove an…Jun 13, 2019Jun 13, 2019
Teresa RothaarinThe StartupDon’t Use Public USB Charging Stations, and Other Cyber Travel TipsEveryone is familiar with travel safety tips such as leaving valuables at home and keeping their hotel room locked, but few people give…May 22, 20194May 22, 20194
Teresa RothaarinThe Rothaar ReportHow to Protect Your Business and Yourself from FormjackingFormjacking is a relatively new, frighteningly simple, and dangerously effective cyber attack that grew rapidly in 2018 and is now…May 10, 20196May 10, 20196
Teresa RothaarinThe Rothaar ReportWhat Is Shadow IT? Understanding the Hazards of Rogue Apps“Shadow IT” is a broad term referring to any software, device, or service being used on an enterprise network without the knowledge of the…Mar 26, 20191Mar 26, 20191
Teresa RothaarinThe Rothaar ReportThe Biggest Cyber Threats Facing Businesses Right NowEnterprise cyberattacks are growing more frequent, sophisticated, destructive, and costly, alarming global investors and c-suite…Mar 20, 20191Mar 20, 20191
Teresa RothaarinThe Rothaar ReportGDPR Compliance Has Benefits, But It Doesn’t Ensure CybersecurityCompliance with the European Union’s General Data Protection Regulation (GDPR) can be confusing and costly, with organizations reporting…Mar 19, 2019Mar 19, 2019