iOS app Android app

Data Security

Why You Should Beware of the "Most Used Words" App on Facebook

Adam Levin | Posted 11.26.2015 | Technology
Adam Levin

The reason this app has privacy hawks screeching is simple: it grabs an enormous amount of personally identifiable information and private details about Facebook users for way too little in return.

How to Keep Your Smart Devices From Exposing Your Data

Adam Levin | Posted 11.19.2015 | Technology
Adam Levin

In 2015, somewhere in the neighborhood of 1 billion Internet of Things (IoT) devices will be purchased, an increase of 60 percent over the previous year. There will be 10 billion IoT devices connected to the Internet this year.

Ending Indifference Toward Consumer Financial Safeguards

Steven Smith | Posted 11.12.2015 | Black Voices
Steven Smith

Consumer vulnerabilities affect everyone -- financial institutions and retailers who must bear the cost, small businesses whose reputations' suffer if their consumers are affected by fraud, and most importantly, working class Americans who have to bear these consequences firsthand.

Identity Theft: A Real-World Version of 'The Walking Dead'

Adam Levin | Posted 10.29.2015 | Technology
Adam Levin

Breaches, and the identity theft that flows from them, have become the third certainty in life, right behind death and taxes. Your introduction to the fact that you got "got" can take many forms.

The Not-So-Secret Service: What Your Company Can Learn From the Rep. Chaffetz Scandal

Tom Garrubba | Posted 10.21.2015 | Business
Tom Garrubba

How can your company learn from the U.S. Secret Service's mistakes? Start by developing basic information security guidelines with respect to who can access sensitive data (such as personnel files or other confidential data) within your organization.

What's the Big Deal With Data?

Victoria Espinel | Posted 10.21.2015 | Technology
Victoria Espinel

Plenty, according to new report from BSA | The Software Alliance We are generating more data today than ever before - and it's improving everything...

Physician Heal Thyself: Are Your Medical Records Safe?

Adam Levin | Posted 10.19.2015 | Technology
Adam Levin

We live in a time when databases have started to include a terrifying amount of extremely intimate information about illnesses, diagnoses, treatments and health issues that nobody should have to fear might become reading material for criminals or their customers.

Does Your Airline Really Understand Data Security?

Adam Levin | Posted 10.09.2015 | Technology
Adam Levin

A friendly reminder to organizations in regular communication with the public: You never know who John Q. Public is.

How the Ashley Madison Hack Might Impact You | Posted 08.28.2015 | Technology

Whether you are a part of the database or not, this hack could affect you. Millions of e-mail addresses, home addresses, credit cards and other information are contained within the leaked database.

Privacy Is Dead: What You Still Can Do to Protect Yourself

Adam Levin | Posted 08.27.2015 | Technology
Adam Levin

In the absence of instant security gratification at a time when breaches have become the third certainty in life and consumers are the product -- how do we better protect ourselves?

Ashley Madison Hack: How to Protect Your Finances

Robert Harrow | Posted 08.20.2015 | Business
Robert Harrow

Anytime a big breach like the recent Ashley Madison hack/leak happens, one question tends to come to my mind: how ready are people to protect themselves? There is a myriad of steps individuals can take before and after they fall victim to a hack or scam.

Ashley Madison: Divine Justice or Buyer Beware?

Harlan Loeb | Posted 07.23.2015 | Business
Harlan Loeb

In this age when objectionable activity can be addressed through hacking that leaves permanent reputational damage, data-governance policies must be a top priority - and not only for financial institutions that can hedge their risks but also those companies that cannot.

Open Letter on the OPM Breach

Adam Levin | Posted 07.10.2015 | Technology
Adam Levin

"It's really frustrating to think that my family might suffer from my information having been stolen." Those are the words of David Thul, who served 22 years with the Minnesota National Guard, was deployed to Kosovo in 2003 and again to Iraq from 2005 to 2007. "My country didn't have my back."

Why You Need to Add Third Parties Into Your Business Resiliency Equation

Tom Garrubba | Posted 07.09.2015 | Business
Tom Garrubba

You'll never know where the next "hit" is going to come from, but if or when it does, the efforts brought into it should certainly pay off.

Nigerians May Soon Have to Worry About Implanted Pacemaker Security

Utibe Effiong | Posted 06.02.2015 | Healthy Living
Utibe Effiong

Soon some of us will be enjoying the freedom granted by an Internet-enabled pacemaker. It would be good to have that without the heartache that comes with worrying about what a hacker might do in this new world of implanted Internet-connected medical devices.

The Recent IRS Breach and How We Can Act to Secure Personal Data

Rep. Jan Schakowsky | Posted 05.29.2015 | Politics
Rep. Jan Schakowsky

Over the past decade, almost one billion records with personal information have been compromised -- things like Social Security numbers, birth dates, address and even tax filing status. In many cases, those breaches were not highly sophisticated.

Wetware: The Major Data Security Threat You've Never Heard Of

Adam Levin | Posted 05.14.2015 | Technology
Adam Levin

While it is disconcerting that there isn't a more robust incident response culture out there, perhaps more worrisome is the seeming lack of best practices pointed at heading off the problem before it happens. That's where a new term comes into play.

How to Protect Your Company's Data by Keeping Your Employees Informed

Jayson DeMers | Posted 06.02.2015 | Technology
Jayson DeMers

Company data security has been a major issue for years, but recent hacks are making it an even more serious concern among small- and medium-sized business owners alike.

After Emailgate Should the Secret Service Protect Candidates Online?

Adam Levin | Posted 05.11.2015 | Politics
Adam Levin

The Democratic and Republican gristmills got to work last week on Hillary Clinton's "homebrew" email, and the ensuing firestorm underscored an alarming lack of cyber-savvy among the leading players of the 2016 election. It also raised a serious question: Should the Secret Service protect presidential candidates from cyber attacks?

The Football Approach to Tackling Data Security Risks

Tom Garrubba | Posted 05.06.2015 | Business
Tom Garrubba

Given today's threat-filled landscape, no data is ever 100 percent secure. But by getting back to "basic blocking and tackling" by implementing simple or even mid-level controls, you can minimize and even mitigate a high percentage of the chances and affects of a breach.

President's State of the Union and White House Proposals Do Little to Address Real Privacy and Data Security Concerns

Adrian Nazari | Posted 03.31.2015 | Technology
Adrian Nazari

While I share president Obama's goals, I fear the complexities of data security could lead to solutions that don't solve the problems -- or actually could make the problems worse.

Obama's Cybersecurity Plan: Do As I Say, Not As I Do

Adam Levin | Posted 03.18.2015 | Politics
Adam Levin

In his recent words on the issue, Obama is dead right. But having spent the past decade focusing on these issues, I'm not ready to take a "Birdman" victory lap through the canyons of midtown Manhattan just yet.

10 Consumer Trends and Implications for Marketing Practice in 2015

Jenny Darroch | Posted 03.07.2015 | Business
Jenny Darroch

As a marketing professor and therefore an active researcher, I pay close attention to changes in consumption and how these changes might impact marketing strategy. Below, I outline ten observations related to consumer trends and offer questions for you to contemplate as you fine-tune your marketing strategies for 2015.

How the Sony Hack Is Changing the Way I Work

Adam Levin | Posted 03.03.2015 | Technology
Adam Levin

If the past two years have revealed anything, it's that every conceivable mode of communication comes with its share of serious privacy and security issues. Email can be hijacked, mail servers can be breached and malware can turn your smartphone into a peepshow.

Is Your Christmas Present Spying on You?

Adam Levin | Posted 02.23.2015 | Technology
Adam Levin

The fact is that few of us know much about the Internet of Things, but that doesn't stop us from wanting it in our homes and on our bodies. But as we snatch up connectable products this Christmas season, the number one issue we face is the protection of our privacy.