iOS app Android app

Data Security

Hackers Bypass Home Depot Debit Card PINs | Posted 09.11.2014 | Business

Home Depot hasn't really told us much about their data breach so far, and for that, I say shame on them. One of the few things they did share though, and quite categorically, is that no debit card PINs were exposed in the breach.

Home Depot's Hack Response in Three Little Words | Posted 09.05.2014 | Business

If the Home Depot breach turns out to be as bad or worse than the Target breach, certain things will be unavoidable for the home improvement giant. But there are some things the company can do to help reduce the short and long term impact and cost.

Are Those Security Questions Begging You to Lie?

Adam Levin | Posted 09.05.2014 | Technology
Adam Levin

As the smoke clears from this latest attack on privacy and our collective sense of decency, it's becoming more and more likely that a deft use of personally identifiable information was used to unlock the nude celebrity photo troves that flooded the Internet.

The Big Lie Behind the Biggest Data Breaches | Posted 09.03.2014 | Business

Enough with the data breach excuses already. Not only are they as jaded as the breaches themselves, they're often just not true. In the aftermath of almost every data breach, chances are you're only going to get a boilerplate public statement.

How Much Privacy Are We Willing to Risk For Mobile Connectivity?

Sam Fiorella | Posted 08.15.2014 | Technology
Sam Fiorella

More of us need to challenge social networks and app developers by reading permissions settings, terms of service, etc., and where we're not comfortable, we need to stand up and say no.

Name Scams: 3 Ways You Can Get Got

Adam Levin | Posted 08.15.2014 | Technology
Adam Levin

The fact is, most everyone will experience some form of identity-related compromise during their lifetime. Yes, you most likely will become a victim.

The Hidden Dangers in Your Kid's Backpack

Adam Levin | Posted 08.11.2014 | Technology
Adam Levin

The things your child carries in his or her rucksack can become weapons of your financial destruction if they fall into the wrong hands.

How to Fraud-proof Your Home

Adam Levin | Posted 09.09.2014 | HuffPost Home
Adam Levin

Summer is here. There will be barbecues. Sand will find its way into the strangest places. Your family, extended family, kids' friends and friends of friends -- even complete strangers -- will sail in and out of your home. But that's okay, because you've fraud-proofed your house... right?

Shred, White and Blue: Freedom From Identity Theft?

Adam Levin | Posted 09.02.2014 | Technology
Adam Levin

As we ready ourselves to enjoy the colorful symbolism in the evening skies of Independence Day celebrations across the nation, it's crucial that you not allow a little something like document shredding stand between you and the truth.

After the Big Data Breach, Has Target Learned Its Lesson?

Adam Levin | Posted 08.12.2014 | Business
Adam Levin

While there have been surveys that tell a different story, with at least one reporting that more than 60 percent of Target shoppers aren't too worried about their data security, the common wisdom now is that a breach can undo years of brand equity -- and that appears to be the case at Target.

Cybercriminals Have Your Number, But Which One?

Adam Levin | Posted 07.28.2014 | Technology
Adam Levin

You probably realize that identity thieves are after your email addresses and passwords, but that's not all they want.

Five Essential Tips for Small Business Data Security

Guy Chiarello | Posted 05.13.2014 | Small Business
Guy Chiarello

While marketing and promotion strategies can accomplish the first two, are small businesses really doing enough to protect their customers' data and reassure them that their personal information is safe?

Data Security: Can Corporations Protect Us From Hackers?

Adam Levin | Posted 07.08.2014 | Technology
Adam Levin

Gregg Steinhafel's ouster at Target this week was a major C-Suite casualty in corporate America's war on hackers. Sales took a major nosedive after the retailer's big data security breach hit the news last December, with fourth-quarter profits down 46 percent. So what's a CEO to do?

The White House Wants A National Identity Ecosystem: A Bad Idea

Rebecca Abrahams | Posted 06.30.2014 | Technology
Rebecca Abrahams

co-authored by Dr. Stephen Bryen, CTO Ziklag Systems Not wanting to be left out of the massive government surveillance business, the White House is p...

The Hole in Microsoft Explorer is Bigger Than You Think

Rebecca Abrahams | Posted 06.29.2014 | Technology
Rebecca Abrahams

Co-authored by Dr. Stephen Bryen, CTO Ziklag Systems Microsoft has now acknowledged that its Internet Explorer Browsers are vulnerable to target...

Data Breaches: Why Assigning Blame Is a Zero-Sum Game

Adam Levin | Posted 06.29.2014 | Technology
Adam Levin

Instead of playing the data breach blame game, you need to take control of the situation. Do a few simple things every day and make yourself a tougher get, have the tools to quickly determine if you are in harm's way and have a solution in place to deal with the fallout.

Is Your Identity Thief Hiding in Your Family Tree?

Adam Levin | Posted 05.21.2014 | Crime
Adam Levin

Most people assume identity thieves are super-sophisticated hackers sitting in front of banks of blinking computer screens. But sometimes you really never see it coming, and the identity thief who ruined your credit and turned your life upside down is actually your mom or dad.

Medical Identity Theft: Does The Health Care Industry Think It's Too Big for Its Breaches?

Adam Levin | Posted 05.17.2014 | Technology
Adam Levin

A study has found a 100 percent increase in criminal attacks on health care organizations since 2010. But if that weren't enough, they also found something far more disturbing.

Human Rights and the Duty to Protect Sensitive Data

Jim Fruchterman | Posted 05.05.2014 | Impact
Jim Fruchterman

Don't victims of human rights abuse, refugees, LGBT individuals, and survivors of gender-based violence deserve the same kind of respect for their sensitive information as you expect when you visit a clinic?

4 Things Your Doctor Doesn't Need to Know

Adam Levin | Posted 05.03.2014 | Healthy Living
Adam Levin

Doctors are bound by the Hippocratic Oath to first do no harm and while they may be very good, or even the best, at what they do, the continuing parade of breach announcements in the health care area is a clear indication that many haven't a clue when it comes to information security.

Why Apple's Unexpected Security Flaw Is a Real Nightmare for Users

Adam Levin | Posted 04.27.2014 | Technology
Adam Levin

Apple fans had a nice run, but it's time to face the fact that perhaps the only thing standing between most of us and a successful targeted cyberattack is our own behavior, not our operating systems.

The FTC: a Tough Data Security Cop

David Balto | Posted 01.23.2014 | Business
David Balto

In Wyndham and other cases the FTC is going after practices that are grossly at odds with responsible industry standards. However, deception actions should not be the only enforcement tool.

A Student's Guide to Online Safety and Preventing Identity Theft

Robert Siciliano | Posted 11.13.2013 | Technology
Robert Siciliano

Leaving Mom and Dad's house to attend college is the beginning of a journey to establish your own identity. Relationships are formed and broken, your ...

How to Keep Employees' Personal Details Secure

Robert Siciliano | Posted 11.12.2013 | Technology
Robert Siciliano

Beware! There are criminals in our midst. We can't see them, but they're around, waiting for our laptops, PCs or work computers to succumb to a virus ...

What's a Data Breach?

Christopher Burgess | Posted 06.22.2013 | Technology
Christopher Burgess

If you are entrusted with data, do take the time to understand the processes and procedures which are in place to protect the data.