Skip to content

Firewall Times

  • About

Catherine Reed

Catherine Reed is a writer and researcher with experience writing about a wide variety of topics including personal finance, technology, and staffing.

T-Mobile Data Breaches: Full Timeline Through 2023

May 17, 2023 by Catherine Reed

Target Data Breach: Full Timeline Through 2023

May 1, 2023 by Catherine Reed

Walmart Data Breaches: Full Timeline Through 2023

April 17, 2023 by Catherine Reed

Verizon Data Breaches: Full Timeline Through 2023

April 7, 2023 by Catherine Reed

Snapchat Data Breaches: Full Timeline Through 2023

April 6, 2023 by Catherine Reed

Netflix Data Breaches: Full Timeline Through 2023

April 6, 2023 by Catherine Reed

Epic Games Security Breaches: Full Timeline Through 2023

April 7, 2023April 6, 2023 by Catherine Reed

Instagram Data Breaches: Full Timeline Through 2023

April 6, 2023 by Catherine Reed

Sony Data Breaches: Full Timeline Through 2023

April 6, 2023 by Catherine Reed

Banner Grabbing: What It Is & How It Works

April 3, 2023 by Catherine Reed

9 Signs Someone Is Watching You Through Your Phone

March 27, 2023March 27, 2023 by Catherine Reed

How to Tell If Your SIM Card Has Been Hacked

March 27, 2023March 20, 2023 by Catherine Reed

How to Stop Someone from Spying on Your Cell Phone

March 27, 2023March 13, 2023 by Catherine Reed

AT&T Data Breaches: Full Timeline Through 2023

March 27, 2023March 9, 2023 by Catherine Reed

Policy vs. Procedure: Know the Difference

March 27, 2023January 2, 2023 by Catherine Reed

Data Destruction: What It Is & How It Protects Data

March 27, 2023December 19, 2022 by Catherine Reed

Data Leak Notice on iPhone – What to Do About It

March 27, 2023December 8, 2022 by Catherine Reed

Amazon Hacked? 5 Ways It Can Happen

March 27, 2023November 25, 2022 by Catherine Reed

Netflix Hacked? How to Tell & What to Do About It

March 27, 2023November 17, 2022 by Catherine Reed

5 Ways to Fix a Hacked Android Phone

March 27, 2023November 7, 2022 by Catherine Reed

Disaster Recovery Sites: Hot, Warm, and Cold

March 27, 2023October 17, 2022 by Catherine Reed

How WPS Attacks Work – And How to Protect Your Network

March 27, 2023October 3, 2022 by Catherine Reed

Clean Desk Policy: What, How, & Why

March 27, 2023September 26, 2022 by Catherine Reed

How to Create a Strong Data Retention Policy

March 27, 2023September 12, 2022 by Catherine Reed

How Layered Security Can Protect Your Network

March 27, 2023August 29, 2022 by Catherine Reed

What Is a Data Owner?

March 27, 2023August 22, 2022 by Catherine Reed

Sensitive Data: Definition, Examples & More

March 27, 2023August 15, 2022 by Catherine Reed

39 Must-Read Phishing Statistics & Facts – 2022

March 27, 2023August 8, 2022 by Catherine Reed

36 Enlightening Cybersecurity Statistics

March 27, 2023July 11, 2022 by Catherine Reed

11 Eye-Catching Hacker Statistics

March 27, 2023June 27, 2022 by Catherine Reed

23 Small Business Cybersecurity Statistics – 2022

March 27, 2023June 13, 2022 by Catherine Reed

27 Must-Know Malware Statistics

March 27, 2023May 30, 2022 by Catherine Reed

18 Types of Hacking: White Hat, Black Hat, & Beyond

March 27, 2023May 23, 2022 by Catherine Reed

21 Social Engineering Statistics – 2022

March 27, 2023May 16, 2022 by Catherine Reed

10 Eye-Catching Spear Phishing Statistics – 2022

March 27, 2023May 9, 2022 by Catherine Reed

26 Eye-Opening Data Breach Statistics – 2022

March 27, 2023May 2, 2022 by Catherine Reed

Top 10 Biggest Data Breaches of All Time

March 27, 2023April 18, 2022 by Catherine Reed

44 Eye-Catching Cell Phone Usage Statistics

March 27, 2023March 29, 2022 by Catherine Reed

32 Key Cyber Attack Statistics

March 27, 2023February 14, 2022 by Catherine Reed

22 Intriguing Employee Engagement Statistics – 2022

March 27, 2023February 7, 2022 by Catherine Reed

Physical Security Controls: An Overview

March 27, 2023January 10, 2022 by Catherine Reed

12 Famous Hackers & Cybercriminals

March 27, 2023October 6, 2021 by Catherine Reed

23 Insightful Peer Pressure Statistics

March 27, 2023September 27, 2021 by Catherine Reed

Administrative Security Controls: Policies, Training, & More

March 27, 2023September 15, 2021 by Catherine Reed

20 Insightful Leadership Statistics

March 27, 2023September 13, 2021 by Catherine Reed

Tailgating Attacks: Understand the Risk

March 27, 2023August 23, 2021 by Catherine Reed

Historical Budgeting: How It Works

March 27, 2023August 6, 2021 by Catherine Reed

External Threats: Everything You Need to Know

March 27, 2023August 2, 2021 by Catherine Reed

Internal Threats: Everything You Need to Know

March 27, 2023August 2, 2021 by Catherine Reed

24 Intriguing Time Management Statistics

March 27, 2023July 26, 2021 by Catherine Reed

32 Enlightening Coffee Statistics

March 27, 2023June 28, 2021 by Catherine Reed

34 Dog Bite Statistics

March 27, 2023June 21, 2021 by Catherine Reed

16 Insightful Chargeback Statistics

April 12, 2023March 24, 2021 by Catherine Reed

24 Eye-Catching Ransomware Statistics – 2020

March 27, 2023December 9, 2020 by Catherine Reed

Where to Report Suspected Phishing Emails

March 27, 2023December 2, 2020 by Catherine Reed

Topics

  • Access Control (18)
  • Attacks (20)
  • Breaches (27)
  • Compliance (5)
  • Cryptography (1)
  • Data (6)
  • IT (1)
  • Miscellaneous (2)
  • Network Security (3)
  • Penetration Testing (3)
  • Phishing (15)
  • Privacy (8)
  • Resilience (6)
  • Risk Management (2)
  • Security Controls (6)
  • Statistics (12)
  • Tech (5)

Related Posts

  • ChatGPT Data Breaches: Full Timeline Through 2023
  • Recent Data Breaches – 2023
  • Facebook Data Breaches: Full Timeline Through 2023
  • Target Data Breach: Full Timeline Through 2023
  • Walmart Data Breaches: Full Timeline Through 2023
About

Privacy Policy

Contact
© 2023 Firewall Times • Built with GeneratePress