Teresa RothaarinThe StartupIs Your Privacy Policy Compliant with the CCPA?Use this checklist to make sure you’re on the right side of California’s data privacy law·4 min read·Jan 20, 2020----
Teresa RothaarinThe StartupBe on the Lookout for Business Email Compromise ScamsCompanies are losing billions to business email compromise scams. Here’s how to recognize BEC before you fall victim.·4 min read·Jul 25, 2019----
Teresa RothaarinThe Rothaar ReportBuckle Up, Defense Contractors: Tighter Cybersecurity Standards Are ComingIn theory, U.S. government contractors should be very secure, especially those working for the Department of Defense (DoD). The majority…·4 min read·Jul 22, 2019----
Teresa RothaarinThe StartupPassword Reuse Is Fueling an Epidemic of Credential StuffingOnline retailers, banks, hotels, and airlines have been struggling with a tidal wave of credential stuffing, with this form of cyberattack…·3 min read·Jun 18, 2019----
Teresa RothaarinThe StartupThe Cybersecurity Mistakes Your Employees Are Probably MakingWe’ve all gotten a laugh out of photos on Instagram and other social media networks where the photographer obviously forgot to remove an…·4 min read·Jun 13, 2019----
Teresa RothaarinThe StartupDon’t Use Public USB Charging Stations, and Other Cyber Travel TipsEveryone is familiar with travel safety tips such as leaving valuables at home and keeping their hotel room locked, but few people give…·4 min read·May 22, 2019--4--4
Teresa RothaarinThe Rothaar ReportHow to Protect Your Business and Yourself from FormjackingFormjacking is a relatively new, frighteningly simple, and dangerously effective cyber attack that grew rapidly in 2018 and is now…·4 min read·May 10, 2019--6--6
Teresa RothaarinThe Rothaar ReportWhat Is Shadow IT? Understanding the Hazards of Rogue Apps“Shadow IT” is a broad term referring to any software, device, or service being used on an enterprise network without the knowledge of the…·3 min read·Mar 26, 2019--1--1
Teresa RothaarinThe Rothaar ReportThe Biggest Cyber Threats Facing Businesses Right NowEnterprise cyberattacks are growing more frequent, sophisticated, destructive, and costly, alarming global investors and c-suite…·4 min read·Mar 20, 2019--1--1
Teresa RothaarinThe Rothaar ReportGDPR Compliance Has Benefits, But It Doesn’t Ensure CybersecurityCompliance with the European Union’s General Data Protection Regulation (GDPR) can be confusing and costly, with organizations reporting…·3 min read·Mar 19, 2019----