The unprecedented rise of the connected age, like any big societal change, leads to unexpected and dramatic questions about safety and security. But the concept of security requires innovators and their products' users to work together.
Do not give anyone remote access to your computer! If someone calls you, claiming to be a Tech Support Guru who is positive you have a virus, do not believe it!
While the risk of cyber attacks is growing, it's important for small and medium-sized businesses to keep perspective and focus on the real threats that are most likely to target their operations.
One conclusion directly related to cyber vulnerabilities is learning from how the monetary, banking and financial systems adapted over the decades to fend off crooks and scamsters. A second conclusion is that "ready, fire, aim" is not always a good response to every crisis.
The Sony Hack was not even one of the ten largest hacks of 2014. Though large, it actually only ranks as the 33rd largest of the year in terms of number of records breached. EBay actually suffered the largest data breach of 2014 (and the second largest since 2005) with more than 150 million records compromised.
With all the data breaches and website hacking that have been going on, how on earth could big brands like AT&T, The New York Times, and Macy's needlessly expose their users' passwords?
In that bygone era of punched cards and tabulating machines, a computer disaster might have been a dropped box of cards. We couldn't do anything very exotic with these simple machines; the Internet and home computers were in no one's crystal ball, but neither was the worry of getting hacked.
Thinking we'd finally done everything we needed to do to play the stinking game, we turned back to the Xbox, which had frozen up completely. No worries. We turned it off and let it reboot, but when it came back on, it immediately froze up again.
Santa huddled with his legal team, the elves and Mrs. Claus wondering whether to bow to the group's demands. Cancel Christmas? Sure, the holiday had descended into a blur of Labor Day Christmas sales. But foregoing his yearly journey would mean disappointing millions of children.
To mitigate the damage and restore confidence, Sony Pictures executives need to develop a plan so this is unlikely to reoccur. While this is easier said than done, IT solutions are available to thwart hackers.
As bad as Sony's cave-in, though, is the ridiculously false "shock" at the hackers' success in exposing the emails. There is incredible naiveté from everyone involved.
It seems like there were more companies that had privacy-related problems in 2014 than didn't. And the lucky ones that didn't "get got" were separated by only one or two degrees from those that did. As we look ahead to 2015, I see a mix of old privacy concerns along with a few emerging dangers.
MakeSchool, which was originally named MakeGamesWithUs, was born after Ashu Desai and Jeremy Rossmann decided that they needed to fix the educational gap in CS education.
The latest greatest swindlers in the cybercrime racket know you're onto their digital three-card monte, and they've made a few adjustments, putting yet another wrinkle in the corporate-hacking game by targeting top-level employees for major profits.
Flip phones are certainly not "safer" than smartphones.
The Internet--one of history's greatest inventions--is also one of history's greatest platforms for crime. Here are ways things can go very wrong with the Internet of Things.