Remove Business Services Remove Communications Remove Privacy Remove Sales
article thumbnail

Yahoo! Agrees to Settle Data Breach Class Actions with $50 Million Fund and Credit Monitoring

Hunton Privacy

and Verizon Communications Inc. had completed an asset sale transaction, pursuant to which Yahoo! s previously operating business became Oath Holdings Inc. Mail services and those who paid for Aabaco Small Business services, which included business email services. In June 2017, Yahoo!

article thumbnail

California Consumer Privacy Act: The Challenge Ahead — Key Terms in the CCPA

HL Chronicle of Data Protection

This is the second installment in Hogan Lovells’ series on the California Consumer Privacy Act. Legislative history can speak volumes about those word choices, and the unique legislative history of the California Consumer Privacy Act of 2018 (CCPA) only highlights the importance of understanding the terms used in the act.

Privacy 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Managed IT Service Providers (MSPs): A Fast Way to Secure IT

eSecurity Planet

While MSPs also provide a wide range of business services, here we’ll focus on managed IT and cybersecurity service providers. For IT services and infrastructure, some larger MSPs will provide generalist services and attempt to solve all problems. You can unsubscribe at any time.

IT 89
article thumbnail

Managed IT Service Providers (MSPs): A Fast Way to Secure IT

eSecurity Planet

While MSPs also provide a wide range of business services, here we’ll focus on managed IT and cybersecurity service providers. For IT services and infrastructure, some larger MSPs will provide generalist services and attempt to solve all problems. You can unsubscribe at any time.

IT 76
article thumbnail

Podcast Episode 123: HaveIBeenPwned’s Troy Hunt on Marriott’s Big Mess and GreatHorn on the Asymmetric Threat of Email

The Security Ledger

And: you’ve heard of Business Email Compromise attacks but what about Business Service Impersonation scams? This follows a 2014 breach of its point of sale system that affected scores of hotels. What do ransomware attacks, executive impersonation scams and remote access trojans all have in common?