iOS app Android app

Data Security

How the Ashley Madison Hack Might Impact You

NextAdvisor.com | Posted 08.28.2015 | Technology
NextAdvisor.com

Whether you are a part of the database or not, this hack could affect you. Millions of e-mail addresses, home addresses, credit cards and other information are contained within the leaked database.

Privacy Is Dead: What You Still Can Do to Protect Yourself

Adam Levin | Posted 08.27.2015 | Technology
Adam Levin

In the absence of instant security gratification at a time when breaches have become the third certainty in life and consumers are the product -- how do we better protect ourselves?

Ashley Madison Hack: How to Protect Your Finances

Robert Harrow | Posted 08.20.2015 | Business
Robert Harrow

Anytime a big breach like the recent Ashley Madison hack/leak happens, one question tends to come to my mind: how ready are people to protect themselves? There is a myriad of steps individuals can take before and after they fall victim to a hack or scam.

Ashley Madison: Divine Justice or Buyer Beware?

Harlan Loeb | Posted 07.23.2015 | Business
Harlan Loeb

In this age when objectionable activity can be addressed through hacking that leaves permanent reputational damage, data-governance policies must be a top priority - and not only for financial institutions that can hedge their risks but also those companies that cannot.

Open Letter on the OPM Breach

Adam Levin | Posted 07.10.2015 | Technology
Adam Levin

"It's really frustrating to think that my family might suffer from my information having been stolen." Those are the words of David Thul, who served 22 years with the Minnesota National Guard, was deployed to Kosovo in 2003 and again to Iraq from 2005 to 2007. "My country didn't have my back."

Why You Need to Add Third Parties Into Your Business Resiliency Equation

Tom Garrubba | Posted 07.09.2015 | Business
Tom Garrubba

You'll never know where the next "hit" is going to come from, but if or when it does, the efforts brought into it should certainly pay off.

Nigerians May Soon Have to Worry About Implanted Pacemaker Security

Utibe Effiong | Posted 06.02.2015 | Healthy Living
Utibe Effiong

Soon some of us will be enjoying the freedom granted by an Internet-enabled pacemaker. It would be good to have that without the heartache that comes with worrying about what a hacker might do in this new world of implanted Internet-connected medical devices.

The Recent IRS Breach and How We Can Act to Secure Personal Data

Rep. Jan Schakowsky | Posted 05.29.2015 | Politics
Rep. Jan Schakowsky

Over the past decade, almost one billion records with personal information have been compromised -- things like Social Security numbers, birth dates, address and even tax filing status. In many cases, those breaches were not highly sophisticated.

Wetware: The Major Data Security Threat You've Never Heard Of

Adam Levin | Posted 05.14.2015 | Technology
Adam Levin

While it is disconcerting that there isn't a more robust incident response culture out there, perhaps more worrisome is the seeming lack of best practices pointed at heading off the problem before it happens. That's where a new term comes into play.

How to Protect Your Company's Data by Keeping Your Employees Informed

Jayson DeMers | Posted 06.02.2015 | Technology
Jayson DeMers

Company data security has been a major issue for years, but recent hacks are making it an even more serious concern among small- and medium-sized business owners alike.

After Emailgate Should the Secret Service Protect Candidates Online?

Adam Levin | Posted 05.11.2015 | Politics
Adam Levin

The Democratic and Republican gristmills got to work last week on Hillary Clinton's "homebrew" email, and the ensuing firestorm underscored an alarming lack of cyber-savvy among the leading players of the 2016 election. It also raised a serious question: Should the Secret Service protect presidential candidates from cyber attacks?

The Football Approach to Tackling Data Security Risks

Tom Garrubba | Posted 05.06.2015 | Business
Tom Garrubba

Given today's threat-filled landscape, no data is ever 100 percent secure. But by getting back to "basic blocking and tackling" by implementing simple or even mid-level controls, you can minimize and even mitigate a high percentage of the chances and affects of a breach.

President's State of the Union and White House Proposals Do Little to Address Real Privacy and Data Security Concerns

Adrian Nazari | Posted 03.31.2015 | Technology
Adrian Nazari

While I share president Obama's goals, I fear the complexities of data security could lead to solutions that don't solve the problems -- or actually could make the problems worse.

Obama's Cybersecurity Plan: Do As I Say, Not As I Do

Adam Levin | Posted 03.18.2015 | Politics
Adam Levin

In his recent words on the issue, Obama is dead right. But having spent the past decade focusing on these issues, I'm not ready to take a "Birdman" victory lap through the canyons of midtown Manhattan just yet.

10 Consumer Trends and Implications for Marketing Practice in 2015

Jenny Darroch | Posted 03.07.2015 | Business
Jenny Darroch

As a marketing professor and therefore an active researcher, I pay close attention to changes in consumption and how these changes might impact marketing strategy. Below, I outline ten observations related to consumer trends and offer questions for you to contemplate as you fine-tune your marketing strategies for 2015.

How the Sony Hack Is Changing the Way I Work

Adam Levin | Posted 03.03.2015 | Technology
Adam Levin

If the past two years have revealed anything, it's that every conceivable mode of communication comes with its share of serious privacy and security issues. Email can be hijacked, mail servers can be breached and malware can turn your smartphone into a peepshow.

Is Your Christmas Present Spying on You?

Adam Levin | Posted 02.23.2015 | Technology
Adam Levin

The fact is that few of us know much about the Internet of Things, but that doesn't stop us from wanting it in our homes and on our bodies. But as we snatch up connectable products this Christmas season, the number one issue we face is the protection of our privacy.

The Most Important Lessons You Can Learn From the Sony Hack

Adam Levin | Posted 02.17.2015 | Business
Adam Levin

Anyone who runs a business -- whether it's a mom-and-pop shop or a multinational behemoth like Sony -- needs to pay close attention to what happened here, and begin to take data security seriously.

5 Big Privacy Predictions for 2015

Adam Levin | Posted 02.11.2015 | Technology
Adam Levin

It seems like there were more companies that had privacy-related problems in 2014 than didn't. And the lucky ones that didn't "get got" were separated by only one or two degrees from those that did. As we look ahead to 2015, I see a mix of old privacy concerns along with a few emerging dangers.

Colleague or Criminal? The Sneaky New Cyberthreat You Face at Work

Adam Levin | Posted 02.04.2015 | Crime
Adam Levin

The latest greatest swindlers in the cybercrime racket know you're onto their digital three-card monte, and they've made a few adjustments, putting yet another wrinkle in the corporate-hacking game by targeting top-level employees for major profits.

It's 10 p.m. Do You Know Where Your Social Security Number Is?

Adam Levin | Posted 01.07.2015 | Technology
Adam Levin

Your Social Security number is a skeleton key in the hands of an identity thief, but it's not just about money. Those nine digits are used in too many transactions to enumerate, and because of that, there are plenty of opportunities for them to fall into the wrong hands.

7 Ways Data Currently Being Collected About You Could Hurt Your Career or Personal Life

Frank Pasquale | Posted 01.06.2015 | World
Frank Pasquale

Databases may be defaming you without you even knowing it.

Fear and Worry in America? Identity Theft and Cybercrime

CreditSesame.com | Posted 01.05.2015 | Money
CreditSesame.com

What's the biggest worry for Americans? Here's a clue. It's not Ebola, terrorism or spiders. According to two separate studies and polls in just the last two weeks, the two things that most Americans worry about, even fear, are identity theft and hacking.

Here's How the New Chip-and-PIN Credit Cards Could Be DOA

Adam Levin | Posted 12.31.2014 | Technology
Adam Levin

Whether the hackers banked a false sense of security at the institutional level, knowing that the protocols might be deemed an unnecessary expense, or the recent attacks are merely part of the chip card learning curve, this latest technology is only as good as its implementation.

JPMorgan Breach Is 'Crisis Point' For Banks

AP | By ALEX VEIGA | Posted 12.03.2014 | Business

LOS ANGELES (AP) — New details on a cyberattack against JPMorgan Chase & Co.'s computer servers this summer add to increasing doubts over the securi...