iOS app Android app

Data Security

Safe Tax: Practical Tips for Everyone

Mark Steber | Posted 02.03.2017 | Business
Mark Steber

This year tax refunds will be as big as ever and going to millions of taxpayers. Accordingly, tax refund thieves are out in full force. Every day the ...

Identity Protection And Security Tips For Holiday Shopping & More

Mark Steber | Posted 12.12.2016 | Business
Mark Steber

Around this time of year, I'd rather focus on family and fun than identity protection, security, and taxes, but as they say "tis the season." If I lea...

The World is Looking to the US for Third Party Risk Guidance

Tom Garrubba | Posted 09.13.2016 | Business
Tom Garrubba

As more organizations here in North America and overseas increasingly utilize third party vendors with a global presence to perform critical functions, process key transactions and provide exposure to sensitive proprietary information, those organizations with mature third party risk (TPR) programs are receiving a loud call to provide assistance to those new to the TPR field.

B I G B O Y. It's Not "Just" a Password.

Mark Steber | Posted 08.24.2016 | Business
Mark Steber

You may remember the commercials from 2006, where the guy awkwardly whispered his password "Big Boy" in crowded places. These days, using a password ...

4 Signs of Cloud Security Hacks--and How Safe Networks Respond

Ed Wynn | Posted 08.03.2016 | Business
Ed Wynn

Hackers are waiting to pounce when companies bring their internet and phone infrastructure to the cloud. Cloud security is a daunting concern for smal...

The Digital Underworld: What You Need to Know

Doug Irving | Posted 07.26.2016 | Technology
Doug Irving

Illustration by Meriel Waissman Tens of millions of Americans will have their credit-card numbers, hospital records, or digital identities hacked or ...

Moving: A Dangerous Time for Your Identity

Adam Levin | Posted 06.09.2016 | Crime
Adam Levin

Whether we're talking about college kids coming home for a few months or simple relocation, there's nothing relaxing about a move -- or simple. Get it wrong, and you become vulnerable to identity theft and other forms of fraud.

It's the year 2020...how's your cybersecurity?

The Conversation US | Posted 05.02.2016 | Technology
The Conversation US

Steven Weber, University of California, Berkeley and Betsy Cooper, University of California, Berkeley What if, in 2020, wearable devices did not care...

Facebook Sees Spike In Government Data Requests

Reuters | Casey Williams | Posted 12.29.2016 | Technology

(Reuters) - Facebook Inc said on Thursday that government requests for account data increased by 13 percent in the second half of 2015, with the Unit...

Android Phones Are Much Safer Than They Used To Be, Google Says

The Huffington Post | Casey Williams | Posted 04.20.2016 | Technology

Every now and then, a piece of nasty malware worms its way into Google's Play store and onto people's Android devices. But Google says that downloadin...

Police Officials Tell Congress Encryption Hurts Their Ability To Fight Crime

Reuters | Casey Williams | Posted 04.19.2016 | Technology

WASHINGTON, April 19 (Reuters) - The growing use of strong default encryption on mobile devices and communications by criminal suspects is handicappin...

House Finally Approves Bill To Keep Your Old Emails Private

Reuters | Casey Williams | Posted 04.13.2016 | Technology

WASHINGTON (Reuters) - Legislation that would require law enforcement to obtain a search warrant before asking technology companies to hand over dated...

Political Campaigns and Data Security

Daniel Etcovitch | Posted 04.04.2016 | Technology
Daniel Etcovitch

Political campaigns are usually on tight budgets and are much more focused on campaign mechanics than cybersecurity, which to them feels like something outside their realm of expertise, so they spend little time thinking about what's happening to their data.

Government Accuses Apple Of 'Deliberately' Boosting Security To Keep Feds Out

Reuters | Casey Williams | Posted 03.10.2016 | Technology

By Dan Levine and Dustin Volz (Reuters) - The U.S. Justice Department on Thursday said Apple Inc's rhetoric was "false" in a high-profile fight over t...

Apple, FBI Take Their Dispute To Congress

Reuters | Casey Williams | Posted 03.01.2016 | Technology

WASHINGTON (Reuters) - FBI Director James Comey told a congressional panel on Tuesday that a final court ruling forcing Apple Inc to give the FBI dat...

Getting to "Reasonable" With the SAFETY Act

Brian E. Finch | Posted 02.24.2016 | Business
Brian E. Finch

While an executive or board member has every right to ask about a company's cybersecurity posture, the problem is that CIOs generally do not have the ...

Here's What The FBI Actually Asked Apple To Do

The Huffington Post | Casey Williams | Posted 02.18.2016 | Technology

Apple stood up to the government in a big way on Wednesday. But what exactly did the FBI ask Apple to do that’s got everyone whipped into a lather? ...

Will anticipatory compliance be the next best practice?

Tom Garrubba | Posted 02.11.2017 | Business
Tom Garrubba

I was recently invited to speak on a panel regarding third party risk strategies for the Securities Industry and Financial Markets Association's (SIFM...

Let's Use Data to Help Our Kids, Not Lock It Up and Throw Away the Key

Aimee Rogstad Guidera | Posted 02.01.2017 | Education
Aimee Rogstad Guidera

Data is transforming our lives -- how we communicate, shop, do business and even socialize. In education, we are just starting to see the benefits of using data to improve student achievement.

Bootlegging, Piracy and the Modern Workforce Have Things in Common

Ian Khan | Posted 01.25.2017 | Technology
Ian Khan

There are serious correlations and similarities between smuggling alcohol, piracy in any form -- whether it is the real life bad guys on ghost ships in the seas or digital pirates who download stuff off the internet thinking it's all free while some artist starves to death.

12 Resolutions That Could Save Your Identity in 2016

Adam Levin | Posted 12.31.2016 | Business
Adam Levin

The best intentions can't really stop these guys, but adopting a best-practices approach to data security can make your online world more secure. Here are some of the things you can do in 2016 to help avoid the living hell of identity theft and other identity-related crimes.

Why You Should Beware of the "Most Used Words" App on Facebook

Adam Levin | Posted 11.25.2016 | Technology
Adam Levin

The reason this app has privacy hawks screeching is simple: it grabs an enormous amount of personally identifiable information and private details about Facebook users for way too little in return.

How to Keep Your Smart Devices From Exposing Your Data

Adam Levin | Posted 11.19.2016 | Technology
Adam Levin

In 2015, somewhere in the neighborhood of 1 billion Internet of Things (IoT) devices will be purchased, an increase of 60 percent over the previous year. There will be 10 billion IoT devices connected to the Internet this year.

Ending Indifference Toward Consumer Financial Safeguards

Steven Smith | Posted 11.12.2016 | Black Voices
Steven Smith

Consumer vulnerabilities affect everyone -- financial institutions and retailers who must bear the cost, small businesses whose reputations' suffer if their consumers are affected by fraud, and most importantly, working class Americans who have to bear these consequences firsthand.

Identity Theft: A Real-World Version of 'The Walking Dead'

Adam Levin | Posted 10.29.2016 | Technology
Adam Levin

Breaches, and the identity theft that flows from them, have become the third certainty in life, right behind death and taxes. Your introduction to the fact that you got "got" can take many forms.