Personal Identifiable Information
Personally Identifiable Information (PII) refers to any data that can be used to identify a specific individual, either on its own or when combined with other information. This type of information is critical to the security and privacy of individuals, as its exposure or misuse can lead to identity theft, financial fraud, and other personal harms. PII includes a wide range of identifying details such as names, addresses, phone numbers, email addresses, Social Security numbers, passport numbers, driver's license numbers, and biometric data like fingerprints or facial recognition features.
Organizations that handle PII are responsible for implementing robust security measures to protect this data from unauthorized access, breaches, and other cyber threats. They must also ensure compliance with relevant data protection regulations such as the General Data Protection Regulation (GDPR) in Europe, the California Consumer Privacy Act (CCPA) in the United States, and other local privacy laws. Managing PII securely involves practices like data encryption, access controls, regular security audits, and employee training on data privacy.
Safeguarding PII is not only a legal obligation but also fundamental to maintaining consumer trust and confidence. Companies that protect personal data effectively can enhance their reputation and foster stronger relationships with their customers, thereby contributing to long-term business success.
or PII
Personally Identifiable Information (PII) refers to any data that can be used to identify a specific individual, either on its own or when combined with other information. This type of information is critical to the security and privacy of individuals, as its exposure or misuse can lead to identity theft, financial fraud, and other personal harms. PII includes a wide range of identifying details such as names, addresses, phone numbers, email addresses, Social Security numbers, passport numbers, driver's license numbers, and biometric data like fingerprints or facial recognition features.
Organizations that handle PII are responsible for implementing robust security measures to protect this data from unauthorized access, breaches, and other cyber threats. They must also ensure compliance with relevant data protection regulations such as the General Data Protection Regulation (GDPR) in Europe, the California Consumer Privacy Act (CCPA) in the United States, and other local privacy laws. Managing PII securely involves practices like data encryption, access controls, regular security audits, and employee training on data privacy.
Safeguarding PII is not only a legal obligation but also fundamental to maintaining consumer trust and confidence. Companies that protect personal data effectively can enhance their reputation and foster stronger relationships with their customers, thereby contributing to long-term business success.
is any data that can be used to trace an individual’s identity, including names, phone numbers, email addresses, and even IP
The Internet Protocol (IP) is a foundational communication protocol used for relaying packets of data across network boundaries. Structured as part of the Internet Protocol Suite, commonly known as TCP/IP, it is responsible for addressing and routing data so that it can travel across diverse interconnected networks and reach its intended destination. IP operates on the principles of packet-switching and is characterized by its use of unique IP addresses for each device connected to the network, ensuring that data packets are directed accurately.
There are currently two primary versions of Internet Protocol in use: IPv4 and IPv6. IPv4, employing a 32-bit address scheme, has been the predominant version since its inception, but its address space has nearly been exhausted. IPv6, introduced to overcome the limitations of IPv4, uses a 128-bit address scheme, significantly expanding the available address space to accommodate the growing number of internet-connected devices.
By facilitating the efficient and reliable transmission of data, the Internet Protocol underpins the functionality of the modern internet, enabling seamless communication and information sharing on a global scale. As network technologies continue to advance, the importance of robust and adaptable IP standards remains critical to the ongoing growth and evolution of digital connectivity.
addresses. PII
Personally Identifiable Information (PII) refers to any data that can be used to identify a specific individual, either on its own or when combined with other information. This type of information is critical to the security and privacy of individuals, as its exposure or misuse can lead to identity theft, financial fraud, and other personal harms. PII includes a wide range of identifying details such as names, addresses, phone numbers, email addresses, Social Security numbers, passport numbers, driver's license numbers, and biometric data like fingerprints or facial recognition features.
Organizations that handle PII are responsible for implementing robust security measures to protect this data from unauthorized access, breaches, and other cyber threats. They must also ensure compliance with relevant data protection regulations such as the General Data Protection Regulation (GDPR) in Europe, the California Consumer Privacy Act (CCPA) in the United States, and other local privacy laws. Managing PII securely involves practices like data encryption, access controls, regular security audits, and employee training on data privacy.
Safeguarding PII is not only a legal obligation but also fundamental to maintaining consumer trust and confidence. Companies that protect personal data effectively can enhance their reputation and foster stronger relationships with their customers, thereby contributing to long-term business success.
may also include personal characteristics such as biometric data (e.g., fingerprints), photographs or other images of individuals in recognizable contexts, or even the tone of voice when speaking on the phone. Protecting and securing PII
Personally Identifiable Information (PII) refers to any data that can be used to identify a specific individual, either on its own or when combined with other information. This type of information is critical to the security and privacy of individuals, as its exposure or misuse can lead to identity theft, financial fraud, and other personal harms. PII includes a wide range of identifying details such as names, addresses, phone numbers, email addresses, Social Security numbers, passport numbers, driver's license numbers, and biometric data like fingerprints or facial recognition features.
Organizations that handle PII are responsible for implementing robust security measures to protect this data from unauthorized access, breaches, and other cyber threats. They must also ensure compliance with relevant data protection regulations such as the General Data Protection Regulation (GDPR) in Europe, the California Consumer Privacy Act (CCPA) in the United States, and other local privacy laws. Managing PII securely involves practices like data encryption, access controls, regular security audits, and employee training on data privacy.
Safeguarding PII is not only a legal obligation but also fundamental to maintaining consumer trust and confidence. Companies that protect personal data effectively can enhance their reputation and foster stronger relationships with their customers, thereby contributing to long-term business success.
is crucial because it helps protect everyone from scams and criminals who use PII
Personally Identifiable Information (PII) refers to any data that can be used to identify a specific individual, either on its own or when combined with other information. This type of information is critical to the security and privacy of individuals, as its exposure or misuse can lead to identity theft, financial fraud, and other personal harms. PII includes a wide range of identifying details such as names, addresses, phone numbers, email addresses, Social Security numbers, passport numbers, driver's license numbers, and biometric data like fingerprints or facial recognition features.
Organizations that handle PII are responsible for implementing robust security measures to protect this data from unauthorized access, breaches, and other cyber threats. They must also ensure compliance with relevant data protection regulations such as the General Data Protection Regulation (GDPR) in Europe, the California Consumer Privacy Act (CCPA) in the United States, and other local privacy laws. Managing PII securely involves practices like data encryption, access controls, regular security audits, and employee training on data privacy.
Safeguarding PII is not only a legal obligation but also fundamental to maintaining consumer trust and confidence. Companies that protect personal data effectively can enhance their reputation and foster stronger relationships with their customers, thereby contributing to long-term business success.
to try and access accounts or personal information without authorization.
At Intrada Technologies, we take PII
Personally Identifiable Information (PII) refers to any data that can be used to identify a specific individual, either on its own or when combined with other information. This type of information is critical to the security and privacy of individuals, as its exposure or misuse can lead to identity theft, financial fraud, and other personal harms. PII includes a wide range of identifying details such as names, addresses, phone numbers, email addresses, Social Security numbers, passport numbers, driver's license numbers, and biometric data like fingerprints or facial recognition features.
Organizations that handle PII are responsible for implementing robust security measures to protect this data from unauthorized access, breaches, and other cyber threats. They must also ensure compliance with relevant data protection regulations such as the General Data Protection Regulation (GDPR) in Europe, the California Consumer Privacy Act (CCPA) in the United States, and other local privacy laws. Managing PII securely involves practices like data encryption, access controls, regular security audits, and employee training on data privacy.
Safeguarding PII is not only a legal obligation but also fundamental to maintaining consumer trust and confidence. Companies that protect personal data effectively can enhance their reputation and foster stronger relationships with their customers, thereby contributing to long-term business success.
seriously. We use a range of technologies and security protocols to maintain the confidentiality of our customers’ PII
Personally Identifiable Information (PII) refers to any data that can be used to identify a specific individual, either on its own or when combined with other information. This type of information is critical to the security and privacy of individuals, as its exposure or misuse can lead to identity theft, financial fraud, and other personal harms. PII includes a wide range of identifying details such as names, addresses, phone numbers, email addresses, Social Security numbers, passport numbers, driver's license numbers, and biometric data like fingerprints or facial recognition features.
Organizations that handle PII are responsible for implementing robust security measures to protect this data from unauthorized access, breaches, and other cyber threats. They must also ensure compliance with relevant data protection regulations such as the General Data Protection Regulation (GDPR) in Europe, the California Consumer Privacy Act (CCPA) in the United States, and other local privacy laws. Managing PII securely involves practices like data encryption, access controls, regular security audits, and employee training on data privacy.
Safeguarding PII is not only a legal obligation but also fundamental to maintaining consumer trust and confidence. Companies that protect personal data effectively can enhance their reputation and foster stronger relationships with their customers, thereby contributing to long-term business success.
while ensuring they can still easily access their accounts. This includes using encryption to secure PII
Personally Identifiable Information (PII) refers to any data that can be used to identify a specific individual, either on its own or when combined with other information. This type of information is critical to the security and privacy of individuals, as its exposure or misuse can lead to identity theft, financial fraud, and other personal harms. PII includes a wide range of identifying details such as names, addresses, phone numbers, email addresses, Social Security numbers, passport numbers, driver's license numbers, and biometric data like fingerprints or facial recognition features.
Organizations that handle PII are responsible for implementing robust security measures to protect this data from unauthorized access, breaches, and other cyber threats. They must also ensure compliance with relevant data protection regulations such as the General Data Protection Regulation (GDPR) in Europe, the California Consumer Privacy Act (CCPA) in the United States, and other local privacy laws. Managing PII securely involves practices like data encryption, access controls, regular security audits, and employee training on data privacy.
Safeguarding PII is not only a legal obligation but also fundamental to maintaining consumer trust and confidence. Companies that protect personal data effectively can enhance their reputation and foster stronger relationships with their customers, thereby contributing to long-term business success.
and other sensitive data and running thorough background checks on our employees who access PII
Personally Identifiable Information (PII) refers to any data that can be used to identify a specific individual, either on its own or when combined with other information. This type of information is critical to the security and privacy of individuals, as its exposure or misuse can lead to identity theft, financial fraud, and other personal harms. PII includes a wide range of identifying details such as names, addresses, phone numbers, email addresses, Social Security numbers, passport numbers, driver's license numbers, and biometric data like fingerprints or facial recognition features.
Organizations that handle PII are responsible for implementing robust security measures to protect this data from unauthorized access, breaches, and other cyber threats. They must also ensure compliance with relevant data protection regulations such as the General Data Protection Regulation (GDPR) in Europe, the California Consumer Privacy Act (CCPA) in the United States, and other local privacy laws. Managing PII securely involves practices like data encryption, access controls, regular security audits, and employee training on data privacy.
Safeguarding PII is not only a legal obligation but also fundamental to maintaining consumer trust and confidence. Companies that protect personal data effectively can enhance their reputation and foster stronger relationships with their customers, thereby contributing to long-term business success.
during their work. We also maintain robust authentication protocols that require users to confirm their identity before granting them access to personal information. We also regularly review and update our security measures to avoid potential threats.
Protected Health Information (PHI) or HIPAA
The Health Insurance Portability and Accountability Act (HIPAA) is a critical piece of legislation in the United States aimed at protecting sensitive patient health information. Enacted in 1996, HIPAA established comprehensive standards for the privacy and security of medical data, ensuring that healthcare providers, insurers, and other related entities handle patient information responsibly. The Act sets national standards for electronic health care transactions and addresses the security and privacy of health data. It is essential for organizations handling health information to comply with HIPAA regulations to safeguard patient privacy and ensure the integrity and confidentiality of the data. https://www.hhs.gov/hipaa/index.html
The same data protection principles apply to PHI or protected health information, subject to the HIPAA
The Health Insurance Portability and Accountability Act (HIPAA) is a critical piece of legislation in the United States aimed at protecting sensitive patient health information. Enacted in 1996, HIPAA established comprehensive standards for the privacy and security of medical data, ensuring that healthcare providers, insurers, and other related entities handle patient information responsibly. The Act sets national standards for electronic health care transactions and addresses the security and privacy of health data. It is essential for organizations handling health information to comply with HIPAA regulations to safeguard patient privacy and ensure the integrity and confidentiality of the data. https://www.hhs.gov/hipaa/index.html
Privacy Rule. We understand that medical records are extremely sensitive and valuable to scammers. As such, we take extra measures to ensure that any PHI we collect is securely stored and only accessible by authorized users. We use various technologies and protocols to encrypt PHI, limit access rights, log user activity within the system, deploy security patches regularly, and backup data on secure servers.
Healthcare data may be valued at up to $250 per record, compared to the next highest value data type of payment card data which carries an approximate value of only $5.40 per stolen record (Trustwave Report).
Payment Card Industry (PCI
The Payment Card Industry Data Security Standard (PCI DSS) is a framework established to ensure the security of credit, debit, and other payment card transactions and protect cardholders from misuse of their personal information. Developed by the Payment Card Industry Security Standards Council (PCI SSC), which was founded by major credit card companies including Visa, MasterCard, American Express, Discover, and JCB, PCI DSS provides a set of comprehensive data security requirements applicable to all entities involved in processing card payments.
The standard covers a broad array of security measures, including but not limited to managing network security, protecting cardholder data, maintaining a vulnerability management program, implementing strong access control measures, regularly monitoring and testing networks, and maintaining an information security policy. By adhering to PCI DSS, organizations can significantly reduce the risk of data breaches and cyber attacks aimed at stealing payment card information.
Compliance with PCI DSS is mandatory for any organization that stores, processes, or transmits payment card data, regardless of size or number of transactions. The standard is divided into six major goals and 12 requirements, creating a structured approach to securing payment environments:
Build and Maintain a Secure Network and Systems
Install and maintain a firewall configuration to protect cardholder data.
Do not use vendor-supplied defaults for system passwords and other security parameters.
Protect Cardholder Data
Protect stored cardholder data.
Encrypt transmission of cardholder data across open, public networks.
Maintain a Vulnerability Management Program
Protect all systems against malware and regularly update anti-virus software or programs.
Develop and maintain secure systems and applications.
Implement Strong Access Control Measures
Restrict access to cardholder data by business need-to-know.
Identify and authenticate access to system components.
Restrict physical access to cardholder data.
Regularly Monitor and Test Networks
Track and monitor all access to network resources and cardholder data.
Regularly test security systems and processes.
Maintain an Information Security Policy
Maintain a policy that addresses information security for all personnel.
Adhering to PCI DSS not only helps businesses protect sensitive data and foster customer trust but also aligns them with legal and regulatory requirements concerning data protection. Thus, the PCI DSS serves as a critical component in the overall cybersecurity strategy for any organization handling payment card transactions.
)
Credit card information is still considered PII
Personally Identifiable Information (PII) refers to any data that can be used to identify a specific individual, either on its own or when combined with other information. This type of information is critical to the security and privacy of individuals, as its exposure or misuse can lead to identity theft, financial fraud, and other personal harms. PII includes a wide range of identifying details such as names, addresses, phone numbers, email addresses, Social Security numbers, passport numbers, driver's license numbers, and biometric data like fingerprints or facial recognition features.
Organizations that handle PII are responsible for implementing robust security measures to protect this data from unauthorized access, breaches, and other cyber threats. They must also ensure compliance with relevant data protection regulations such as the General Data Protection Regulation (GDPR) in Europe, the California Consumer Privacy Act (CCPA) in the United States, and other local privacy laws. Managing PII securely involves practices like data encryption, access controls, regular security audits, and employee training on data privacy.
Safeguarding PII is not only a legal obligation but also fundamental to maintaining consumer trust and confidence. Companies that protect personal data effectively can enhance their reputation and foster stronger relationships with their customers, thereby contributing to long-term business success.
, and sending credit card numbers by email, or text is like writing it on a bathroom wall for all to see. That's why we strongly recommend not emailing or texting credit card numbers. In addition, it would be best to refrain from sharing credit card information with anyone other than a trusted source. Finally, when collecting credit card information, you should also ensure that your system meets the Payment Card Industry (PCI
The Payment Card Industry Data Security Standard (PCI DSS) is a framework established to ensure the security of credit, debit, and other payment card transactions and protect cardholders from misuse of their personal information. Developed by the Payment Card Industry Security Standards Council (PCI SSC), which was founded by major credit card companies including Visa, MasterCard, American Express, Discover, and JCB, PCI DSS provides a set of comprehensive data security requirements applicable to all entities involved in processing card payments.
The standard covers a broad array of security measures, including but not limited to managing network security, protecting cardholder data, maintaining a vulnerability management program, implementing strong access control measures, regularly monitoring and testing networks, and maintaining an information security policy. By adhering to PCI DSS, organizations can significantly reduce the risk of data breaches and cyber attacks aimed at stealing payment card information.
Compliance with PCI DSS is mandatory for any organization that stores, processes, or transmits payment card data, regardless of size or number of transactions. The standard is divided into six major goals and 12 requirements, creating a structured approach to securing payment environments:
Build and Maintain a Secure Network and Systems
Install and maintain a firewall configuration to protect cardholder data.
Do not use vendor-supplied defaults for system passwords and other security parameters.
Protect Cardholder Data
Protect stored cardholder data.
Encrypt transmission of cardholder data across open, public networks.
Maintain a Vulnerability Management Program
Protect all systems against malware and regularly update anti-virus software or programs.
Develop and maintain secure systems and applications.
Implement Strong Access Control Measures
Restrict access to cardholder data by business need-to-know.
Identify and authenticate access to system components.
Restrict physical access to cardholder data.
Regularly Monitor and Test Networks
Track and monitor all access to network resources and cardholder data.
Regularly test security systems and processes.
Maintain an Information Security Policy
Maintain a policy that addresses information security for all personnel.
Adhering to PCI DSS not only helps businesses protect sensitive data and foster customer trust but also aligns them with legal and regulatory requirements concerning data protection. Thus, the PCI DSS serves as a critical component in the overall cybersecurity strategy for any organization handling payment card transactions.
) Data Security Standard and complete an annual PCI
The Payment Card Industry Data Security Standard (PCI DSS) is a framework established to ensure the security of credit, debit, and other payment card transactions and protect cardholders from misuse of their personal information. Developed by the Payment Card Industry Security Standards Council (PCI SSC), which was founded by major credit card companies including Visa, MasterCard, American Express, Discover, and JCB, PCI DSS provides a set of comprehensive data security requirements applicable to all entities involved in processing card payments.
The standard covers a broad array of security measures, including but not limited to managing network security, protecting cardholder data, maintaining a vulnerability management program, implementing strong access control measures, regularly monitoring and testing networks, and maintaining an information security policy. By adhering to PCI DSS, organizations can significantly reduce the risk of data breaches and cyber attacks aimed at stealing payment card information.
Compliance with PCI DSS is mandatory for any organization that stores, processes, or transmits payment card data, regardless of size or number of transactions. The standard is divided into six major goals and 12 requirements, creating a structured approach to securing payment environments:
Build and Maintain a Secure Network and Systems
Install and maintain a firewall configuration to protect cardholder data.
Do not use vendor-supplied defaults for system passwords and other security parameters.
Protect Cardholder Data
Protect stored cardholder data.
Encrypt transmission of cardholder data across open, public networks.
Maintain a Vulnerability Management Program
Protect all systems against malware and regularly update anti-virus software or programs.
Develop and maintain secure systems and applications.
Implement Strong Access Control Measures
Restrict access to cardholder data by business need-to-know.
Identify and authenticate access to system components.
Restrict physical access to cardholder data.
Regularly Monitor and Test Networks
Track and monitor all access to network resources and cardholder data.
Regularly test security systems and processes.
Maintain an Information Security Policy
Maintain a policy that addresses information security for all personnel.
Adhering to PCI DSS not only helps businesses protect sensitive data and foster customer trust but also aligns them with legal and regulatory requirements concerning data protection. Thus, the PCI DSS serves as a critical component in the overall cybersecurity strategy for any organization handling payment card transactions.
compliance check, usually requested by your merchant account provider. This will help to confirm that credit card data stored in your system is being done securely within the latest security standards on a complaint platform and framework.
Hackers are getting smarter
Hackers have become increasingly sophisticated in their attacks on finance and business services, targeting the source of money. Cybercriminals use various methods to gain access to financial information, from installing malware or phishing scams to exploiting vulnerabilities in software. They can also exploit gaps in security protocols, such as using weak or default passwords or using employee credentials that were previously exposed or lost. In some cases, hackers may use a combination of these methods for maximum effect.
Recent data suggests that finance and business service companies are particularly vulnerable to cybercrime due to the wealth of sensitive data held within their networks. The 2021 Data Risk Report by Veronis found that financial services businesses take an average of 233 days to detect and contain a data breach - significantly longer than other industries. This makes them an attractive target for hackers who seek quick access to funds or other valuable assets stored within finance-related systems.
Given the potential rewards associated with successful attacks on finance companies, these organizations must invest in robust security protocols and stay up-to-date with the latest cyber threats. Finance companies should take measures to protect themselves from cybercrime by implementing strong authentication procedures, encrypting sensitive data, limiting user access rights, running regular vulnerability scans, and always keeping software up-to-date.
Regular Session 2021-2022 - House Bill 1126
In light of the increasing cyberattacks in 2021, it is more important than ever to take data protection seriously. As a result, the U.S. House is considering a bill that would protect consumer data collection and privacy across nearly all sectors and make individuals or classes able to sue for compensatory damages, injunctive relief, declaratory relief, and reasonable attorney’s fees and litigation costs up to four years after the effective date of the action in federal court.
Cyber Insurance
Companies should invest in cyber insurance policies that provide financial compensation in the event of an incident or breach. A good cyber insurance policy will offer coverage for both first-party losses (such as damage caused by a breach) and third-party losses (such as legal fees incurred from defending a lawsuit). Investing in this coverage will help businesses mitigate the financial losses associated with data breaches and other cyberattacks while ensuring that all parties involved are protected from future liability. Just because you have cyber insurance does not mean you are protected. This is an insurance policy and does not fix your security issues. Companies are responsible for ensuring your network is secured, and your staff conducts awareness training regularly.
Training
Companies must invest in training personnel to ensure they understand best practices for data protection and can spot potential threats before they become a problem. This will help protect sensitive data and allow companies to respond quickly if an incident occurs. Training staff on cybersecurity should include topics such as email phishing, holiday frauds, tax, IRS or government imposters, direct deposit, gift cards, social media scams, and the list goes on. Moreover, educating employees on the risks associated with cybercrime can help foster a culture of awareness across all levels of the organization so that everyone remains vigilant against malicious actors.
Intrada offers training and monthly awareness articles for staff on a variety of topics related to data security, ranging from the basics of phishing scams to how to detect and respond quickly in the event of an incident or breach. Our training and awareness programs are designed to help companies recognize potential threats, protect their networks from unauthorized access, and take proactive steps toward data protection.
Intrada monitors emerging threats so we can keep up-to-date with the latest developments in cybercrime. In addition, we offer guidance on how companies can implement best practices such as strong authentication procedures, encryption protocols, user access rights management, policy, and procedures.
Committed to customers
At Intrada, we are committed to keeping our customers’ data safe and secure. We take extra measures regarding PII
Personally Identifiable Information (PII) refers to any data that can be used to identify a specific individual, either on its own or when combined with other information. This type of information is critical to the security and privacy of individuals, as its exposure or misuse can lead to identity theft, financial fraud, and other personal harms. PII includes a wide range of identifying details such as names, addresses, phone numbers, email addresses, Social Security numbers, passport numbers, driver's license numbers, and biometric data like fingerprints or facial recognition features.
Organizations that handle PII are responsible for implementing robust security measures to protect this data from unauthorized access, breaches, and other cyber threats. They must also ensure compliance with relevant data protection regulations such as the General Data Protection Regulation (GDPR) in Europe, the California Consumer Privacy Act (CCPA) in the United States, and other local privacy laws. Managing PII securely involves practices like data encryption, access controls, regular security audits, and employee training on data privacy.
Safeguarding PII is not only a legal obligation but also fundamental to maintaining consumer trust and confidence. Companies that protect personal data effectively can enhance their reputation and foster stronger relationships with their customers, thereby contributing to long-term business success.
, PHI, and credit card data protection. We will continue to stay up-to-date on the latest security protocols and trends so that our clients can know their valuable information is secure.
In conclusion, at Intrada Technologies, we believe that data protection should always be a top priority. Therefore, we strive to keep our customers' information safe by using the most up-to-date security protocols and technologies and regularly monitoring for potential threats.
If you have any questions or concerns about the security of your data, please do not hesitate to contact us. We are here to help.
David Steele is the co-founder of Intrada Technologies, a full-service web development and network management company launched in 2000. David is responsible for developing and managing client and vendor relationships with a focus on delivering quality service. In addition, he provides project management oversight on all security, compliancy, strategy, development and network services.
AI, or artificial intelligence, has become a popular way for businesses to create content for their website easily. While it is a great tool to use, it does have both pros and cons. Let’s dig deeper into how AI works, its positives, its negatives, and Intrada’s recommendations when using it.AI-gener...
As cybersecurity continues to become a growing concern in the digital age, Intrada Technologies makes sure team members attend ShmooCon each year. ShmooCon is an annual three-day conference that brings together cybersecurity experts from around the world to share ideas and best practices for defendi...