iOS app Android app

Data Security

Wetware: The Major Data Security Threat You've Never Heard Of

Adam Levin | Posted 05.14.2015 | Technology
Adam Levin

While it is disconcerting that there isn't a more robust incident response culture out there, perhaps more worrisome is the seeming lack of best practices pointed at heading off the problem before it happens. That's where a new term comes into play.

How to Protect Your Company's Data by Keeping Your Employees Informed

Jayson DeMers | Posted 04.03.2015 | Technology
Jayson DeMers

Company data security has been a major issue for years, but recent hacks are making it an even more serious concern among small- and medium-sized business owners alike.

After Emailgate Should the Secret Service Protect Candidates Online?

Adam Levin | Posted 05.11.2015 | Politics
Adam Levin

The Democratic and Republican gristmills got to work last week on Hillary Clinton's "homebrew" email, and the ensuing firestorm underscored an alarming lack of cyber-savvy among the leading players of the 2016 election. It also raised a serious question: Should the Secret Service protect presidential candidates from cyber attacks?

The Football Approach to Tackling Data Security Risks

Tom Garrubba | Posted 05.06.2015 | Business
Tom Garrubba

Given today's threat-filled landscape, no data is ever 100 percent secure. But by getting back to "basic blocking and tackling" by implementing simple or even mid-level controls, you can minimize and even mitigate a high percentage of the chances and affects of a breach.

President's State of the Union and White House Proposals Do Little to Address Real Privacy and Data Security Concerns

Adrian Nazari | Posted 03.31.2015 | Technology
Adrian Nazari

While I share president Obama's goals, I fear the complexities of data security could lead to solutions that don't solve the problems -- or actually could make the problems worse.

Obama's Cybersecurity Plan: Do As I Say, Not As I Do

Adam Levin | Posted 03.18.2015 | Politics
Adam Levin

In his recent words on the issue, Obama is dead right. But having spent the past decade focusing on these issues, I'm not ready to take a "Birdman" victory lap through the canyons of midtown Manhattan just yet.

10 Consumer Trends and Implications for Marketing Practice in 2015

Jenny Darroch | Posted 03.07.2015 | Business
Jenny Darroch

As a marketing professor and therefore an active researcher, I pay close attention to changes in consumption and how these changes might impact marketing strategy. Below, I outline ten observations related to consumer trends and offer questions for you to contemplate as you fine-tune your marketing strategies for 2015.

How the Sony Hack Is Changing the Way I Work

Adam Levin | Posted 03.03.2015 | Technology
Adam Levin

If the past two years have revealed anything, it's that every conceivable mode of communication comes with its share of serious privacy and security issues. Email can be hijacked, mail servers can be breached and malware can turn your smartphone into a peepshow.

Is Your Christmas Present Spying on You?

Adam Levin | Posted 02.23.2015 | Technology
Adam Levin

The fact is that few of us know much about the Internet of Things, but that doesn't stop us from wanting it in our homes and on our bodies. But as we snatch up connectable products this Christmas season, the number one issue we face is the protection of our privacy.

The Most Important Lessons You Can Learn From the Sony Hack

Adam Levin | Posted 02.17.2015 | Business
Adam Levin

Anyone who runs a business -- whether it's a mom-and-pop shop or a multinational behemoth like Sony -- needs to pay close attention to what happened here, and begin to take data security seriously.

5 Big Privacy Predictions for 2015

Adam Levin | Posted 02.11.2015 | Technology
Adam Levin

It seems like there were more companies that had privacy-related problems in 2014 than didn't. And the lucky ones that didn't "get got" were separated by only one or two degrees from those that did. As we look ahead to 2015, I see a mix of old privacy concerns along with a few emerging dangers.

Colleague or Criminal? The Sneaky New Cyberthreat You Face at Work

Adam Levin | Posted 02.04.2015 | Crime
Adam Levin

The latest greatest swindlers in the cybercrime racket know you're onto their digital three-card monte, and they've made a few adjustments, putting yet another wrinkle in the corporate-hacking game by targeting top-level employees for major profits.

It's 10 p.m. Do You Know Where Your Social Security Number Is?

Adam Levin | Posted 01.07.2015 | Technology
Adam Levin

Your Social Security number is a skeleton key in the hands of an identity thief, but it's not just about money. Those nine digits are used in too many transactions to enumerate, and because of that, there are plenty of opportunities for them to fall into the wrong hands.

7 Ways Data Currently Being Collected About You Could Hurt Your Career or Personal Life

Frank Pasquale | Posted 01.06.2015 | World
Frank Pasquale

Databases may be defaming you without you even knowing it.

Fear and Worry in America? Identity Theft and Cybercrime

CreditSesame.com | Posted 01.05.2015 | Money
CreditSesame.com

What's the biggest worry for Americans? Here's a clue. It's not Ebola, terrorism or spiders. According to two separate studies and polls in just the last two weeks, the two things that most Americans worry about, even fear, are identity theft and hacking.

Here's How the New Chip-and-PIN Credit Cards Could Be DOA

Adam Levin | Posted 12.31.2014 | Technology
Adam Levin

Whether the hackers banked a false sense of security at the institutional level, knowing that the protocols might be deemed an unnecessary expense, or the recent attacks are merely part of the chip card learning curve, this latest technology is only as good as its implementation.

JPMorgan Breach Is 'Crisis Point' For Banks

AP | By ALEX VEIGA | Posted 12.03.2014 | Business

LOS ANGELES (AP) — New details on a cyberattack against JPMorgan Chase & Co.'s computer servers this summer add to increasing doubts over the securi...

iOS 8 Wants to Get to Know You Better

Adam Levin | Posted 11.26.2014 | Technology
Adam Levin

The take-away, if there is one, is that while the iOS 8 upgrade represents a giant leap forward with regard to what you can do with your smartphone, it also expands your "attackable surface."

Please Protect Me From My Password

Tarun Sakhrani | Posted 11.21.2014 | Technology
Tarun Sakhrani

In today's day and age, with technology at our fingertips (quite literally) there has been a bit of an invasion of our personal space and our privacy. Some of it is by our choosing, some of it not so much.

Hackers Bypass Home Depot Debit Card PINs

CreditSesame.com | Posted 11.11.2014 | Business
CreditSesame.com

Home Depot hasn't really told us much about their data breach so far, and for that, I say shame on them. One of the few things they did share though, and quite categorically, is that no debit card PINs were exposed in the breach.

Home Depot's Hack Response in Three Little Words

CreditSesame.com | Posted 11.04.2014 | Business
CreditSesame.com

If the Home Depot breach turns out to be as bad or worse than the Target breach, certain things will be unavoidable for the home improvement giant. But there are some things the company can do to help reduce the short and long term impact and cost.

Are Those Security Questions Begging You to Lie?

Adam Levin | Posted 11.05.2014 | Technology
Adam Levin

As the smoke clears from this latest attack on privacy and our collective sense of decency, it's becoming more and more likely that a deft use of personally identifiable information was used to unlock the nude celebrity photo troves that flooded the Internet.

The Big Lie Behind the Biggest Data Breaches

CreditSesame.com | Posted 11.02.2014 | Business
CreditSesame.com

Enough with the data breach excuses already. Not only are they as jaded as the breaches themselves, they're often just not true. In the aftermath of almost every data breach, chances are you're only going to get a boilerplate public statement.

How Much Privacy Are We Willing to Risk For Mobile Connectivity?

Sam Fiorella | Posted 10.15.2014 | Technology
Sam Fiorella

More of us need to challenge social networks and app developers by reading permissions settings, terms of service, etc., and where we're not comfortable, we need to stand up and say no.

Name Scams: 3 Ways You Can Get Got

Adam Levin | Posted 10.15.2014 | Technology
Adam Levin

The fact is, most everyone will experience some form of identity-related compromise during their lifetime. Yes, you most likely will become a victim.