iOS app Android app

Data Security

How to Fraud-proof Your Home

Adam Levin | Posted 07.10.2014 | HuffPost Home
Adam Levin

Summer is here. There will be barbecues. Sand will find its way into the strangest places. Your family, extended family, kids' friends and friends of friends -- even complete strangers -- will sail in and out of your home. But that's okay, because you've fraud-proofed your house... right?

Shred, White and Blue: Freedom From Identity Theft?

Adam Levin | Posted 07.07.2014 | Technology
Adam Levin

As we ready ourselves to enjoy the colorful symbolism in the evening skies of Independence Day celebrations across the nation, it's crucial that you not allow a little something like document shredding stand between you and the truth.

After the Big Data Breach, Has Target Learned Its Lesson?

Adam Levin | Posted 06.12.2014 | Business
Adam Levin

While there have been surveys that tell a different story, with at least one reporting that more than 60 percent of Target shoppers aren't too worried about their data security, the common wisdom now is that a breach can undo years of brand equity -- and that appears to be the case at Target.

Cybercriminals Have Your Number, But Which One?

Adam Levin | Posted 07.28.2014 | Technology
Adam Levin

You probably realize that identity thieves are after your email addresses and passwords, but that's not all they want.

Five Essential Tips for Small Business Data Security

Guy Chiarello | Posted 05.13.2014 | Small Business
Guy Chiarello

While marketing and promotion strategies can accomplish the first two, are small businesses really doing enough to protect their customers' data and reassure them that their personal information is safe?

Data Security: Can Corporations Protect Us From Hackers?

Adam Levin | Posted 07.08.2014 | Technology
Adam Levin

Gregg Steinhafel's ouster at Target this week was a major C-Suite casualty in corporate America's war on hackers. Sales took a major nosedive after the retailer's big data security breach hit the news last December, with fourth-quarter profits down 46 percent. So what's a CEO to do?

The White House Wants A National Identity Ecosystem: A Bad Idea

Rebecca Abrahams | Posted 06.30.2014 | Technology
Rebecca Abrahams

co-authored by Dr. Stephen Bryen, CTO Ziklag Systems Not wanting to be left out of the massive government surveillance business, the White House is p...

The Hole in Microsoft Explorer is Bigger Than You Think

Rebecca Abrahams | Posted 06.29.2014 | Technology
Rebecca Abrahams

Co-authored by Dr. Stephen Bryen, CTO Ziklag Systems Microsoft has now acknowledged that its Internet Explorer Browsers are vulnerable to target...

Data Breaches: Why Assigning Blame Is a Zero-Sum Game

Adam Levin | Posted 06.29.2014 | Technology
Adam Levin

Instead of playing the data breach blame game, you need to take control of the situation. Do a few simple things every day and make yourself a tougher get, have the tools to quickly determine if you are in harm's way and have a solution in place to deal with the fallout.

Is Your Identity Thief Hiding in Your Family Tree?

Adam Levin | Posted 05.21.2014 | Crime
Adam Levin

Most people assume identity thieves are super-sophisticated hackers sitting in front of banks of blinking computer screens. But sometimes you really never see it coming, and the identity thief who ruined your credit and turned your life upside down is actually your mom or dad.

Medical Identity Theft: Does The Health Care Industry Think It's Too Big for Its Breaches?

Adam Levin | Posted 05.17.2014 | Technology
Adam Levin

A study has found a 100 percent increase in criminal attacks on health care organizations since 2010. But if that weren't enough, they also found something far more disturbing.

Human Rights and the Duty to Protect Sensitive Data

Jim Fruchterman | Posted 05.05.2014 | Impact
Jim Fruchterman

Don't victims of human rights abuse, refugees, LGBT individuals, and survivors of gender-based violence deserve the same kind of respect for their sensitive information as you expect when you visit a clinic?

4 Things Your Doctor Doesn't Need to Know

Adam Levin | Posted 05.03.2014 | Healthy Living
Adam Levin

Doctors are bound by the Hippocratic Oath to first do no harm and while they may be very good, or even the best, at what they do, the continuing parade of breach announcements in the health care area is a clear indication that many haven't a clue when it comes to information security.

Why Apple's Unexpected Security Flaw Is a Real Nightmare for Users

Adam Levin | Posted 04.27.2014 | Technology
Adam Levin

Apple fans had a nice run, but it's time to face the fact that perhaps the only thing standing between most of us and a successful targeted cyberattack is our own behavior, not our operating systems.

The FTC: a Tough Data Security Cop

David Balto | Posted 01.23.2014 | Business
David Balto

In Wyndham and other cases the FTC is going after practices that are grossly at odds with responsible industry standards. However, deception actions should not be the only enforcement tool.

A Student's Guide to Online Safety and Preventing Identity Theft

Robert Siciliano | Posted 11.13.2013 | Technology
Robert Siciliano

Leaving Mom and Dad's house to attend college is the beginning of a journey to establish your own identity. Relationships are formed and broken, your ...

How to Keep Employees' Personal Details Secure

Robert Siciliano | Posted 11.12.2013 | Technology
Robert Siciliano

Beware! There are criminals in our midst. We can't see them, but they're around, waiting for our laptops, PCs or work computers to succumb to a virus ...

What's a Data Breach?

Christopher Burgess | Posted 06.22.2013 | Technology
Christopher Burgess

If you are entrusted with data, do take the time to understand the processes and procedures which are in place to protect the data.

What Star Wars Teaches Us About Computer Security

Sean Michael Kerner | Posted 10.18.2012 | Technology
Sean Michael Kerner

Many have found inspiration and solace in Star Wars that can apply to the everyday real world, including data security. It teaches us that it is important to protect all the important data that you have with core access control.

Bring Your Own Device Schemes Should Set Alarm Bells Ringing

Norman Shaw | Posted 09.13.2012 | Business
Norman Shaw

With employees increasingly shuttling their hardware between home and office, businesses need to be sharper at ensuring they're covering the accompanying security risks.

mHealth: My Father's First Cellphone and the Evolution of Risk

Dr Layla McCay | Posted 05.21.2012 | Healthy Living
Dr Layla McCay

Cellphones are being used in prevention, diagnosis and treatment, from prenatal to the last years of life, right across the spectrum of care. In health and development, "mHealth" (short for "mobile health") is the new black.

Student Privacy in Peril: Massive Data Gathering With Inadequate Privacy and Security

Daniel J. Solove | Posted 12.19.2011 | Education
Daniel J. Solove

One thing is for certain: the Department of Education's mishandling of personal student financial data in this latest data breach proves that we should be wary of how the Department will utilize this type of data in the future.

Bianca Bosker

The Fabulous Fab's Cautionary Tale: Data Never Dies

HuffingtonPost.com | Bianca Bosker | Posted 08.01.2011 | Technology

Fabrice Tourre (a.k.a. the "Fabulous Fab"), the Goldman Sachs mortgage trader who has become synonymous with Wall Street shenanigans, has now become s...

The Next Big Healthcare Debate: Data Privacy and Security

Rita K. Bowen | Posted 05.25.2011 | Technology
Rita K. Bowen

With each solution along the road to healthcare reform, we uncover a new challenge. The hype gets old and we become numb. It's high time to fix a largely inefficient system for the benefit of American patients

Three Good Reasons to Lock Down Your Wireless Network

Christopher Burgess | Posted 05.25.2011 | Technology
Christopher Burgess

Remember, anyone driving or sitting in proximity to your business, home, or office may be within the exploitable footprint of Wi-Fi signal.