Security Breaches in Healthcare: How To Protect Patient Data

Fathom

Jay: A common one is clicking links in phishing emails. Jay: All users, even IT administrators, should only be granted the rights and permissions they need to perform their everyday tasks.

Obey Facebook’s Rules of Engagement (Or Else)

Marketing Action

These standards touch upon subjects like violence, bullying, phishing, scamming, and harassment. Here’s a shortlist of guidelines: Obtain written permission before publishing content on someone’s behalf.

Rules 106

How do you sell SaaS software to enterprise businesses?

Leadfeeder

Fine-grained permission controls. While startups are small teams where everyone can be trusted with more access, the principle in big organisations is usually to limit everything to the barest minimum each employee needs, so that if credentials get lost or phished (which is a bigger risk in larger organisations, just due to scale), less harm can be done.

You're Pregnant! Just Kidding. Here's the News You Missed This Week.

Hubspot

There were some fears that the emails were a result of phishing attempts, but in the end, Amazon confirmed to TechCrunch that the emails were the result of a technical glitch, going on to send apology emails to the customers that received them.