Apple & Google: We Won't Snitch
In moves that acknowledge public distrust of police and government agencies following Edward Snowden's "big reveal," two leading smartphone providers – Apple and Google – have upped their security,...
View ArticleAntique Data Netting Canadian Man Thousands (So He Says)
This has been a huge year for data breach news – some of it was the "strange but true" variety. For example, take the recent story posted on Sophos's data security site Naked Security. Apparently, one...
View ArticleHome Depot Data Breach Already Causing Customer Losses
The Star’s report on Home Depot's data breach shows just how quickly cyber criminals can make a profit from a cyber attack. The hackers have already used stolen data to drain bank accounts, purchase...
View ArticleFBI Reports More Data Breaches from Disgruntled Employees
Last week, the FBI issued a cyber security warning, stating there’s been an increase in data breaches caused by disgruntled employees on or around the time they left their employer. Employees were...
View ArticleRecommend IT Services to Clients? Know the Risks
It may seem unfathomable, but it's true: you can be sued when software, SaaS, cloud storage, or technology made by another company is hacked. Why are you liable for another company's products? It's...
View ArticleShellshock Sure Understands the Halloween Spirit
The Shellshock vulnerability – a bug that exposes Unix-based computers (including Mac OS X) to remote code-injection attacks – burst onto the scene just in time for Halloween. It's currently spooking...
View ArticleIn Data Security, Compliance Isn't Enough
The Telegraph reports a paradigm shift taking place among IT industry leaders: more data security consultants are realizing that merely complying with security regulations isn't enough to protect...
View Article"BadUSB" Code Reminds Us All to Stay Paranoid
There's a page in many corporate IT handbooks that contains a warning about using USB devices like thumb drives on work computers. These devices could contain malware and should be quarantined.While...
View ArticleFour States Update Data Breach Notification Laws
According to JD Supra, four states have changed their data breach notification laws in the wake of 2014's onslaught of data breaches. Here's what IT consultants need to know about new state...
View ArticleSnapchat Leak Offers Liability Lessons for App Developers
The Washington Post reports that 13GB of "snaps" (Snapchat photos) have been leaked online on the hacker forum 4chan. A flaw in a third-party app that lets users save the otherwise temporary messages...
View ArticleLoss, Theft of Devices Still Among the Most Common Data Breaches
The Dallas Morning News details a recent data breach in which a number of laptops with patient records were stolen from the back of city ambulances between 2011 and 2014. Do stolen computers count as...
View ArticleThe Free Security Tool Your Clients Probably Aren't Using
As IT security blogger Brian Krebs reports, last week saw a wave of critical security updates to Microsoft Windows, Java, and two Adobe programs.Your clients might not realize that by delaying an...
View ArticlePhishing by the Dock of eBay
CIO Today reports eBay was hacked…again. Over the summer, nearly 145 million passwords were exposed, but this time hackers used a different approach to harvest data.Because eBay allows JavaScript and...
View ArticleBeyond Passwords and PINs
From an IT perspective, a password or PIN is not a hallmark of security – it's a necessary evil. Ideally, there'd be a more secure way of encrypting and transferring data, but as it is, we're stuck...
View ArticleGive This to Your Clients, Cut Your Cyber Exposure
One of the biggest challenges an IT consultant faces is getting clients to adopt basic data security measures that will protect their company from data breaches, accidental data leaks, and other data...
View ArticleThis Is What We Mean by "Reputational Damage"
Last week, a group of retailers known as MCX (Merchant Customer Exchange) made news when two members – CVS and Rite Aid – ditched their plan to use Apple Pay in favor of MCX's own mobile payment...
View ArticleShould You Have a Data Breach Clause in Your Contracts?
The recent string of data breaches has shown how different industries respond to new fears about data security. For instance, in response to the growing concerns of clients, corporate lawyers are...
View ArticleWhy the 31% of Businesses without Cyber Insurance Should Scare You
Insurance Journal reports on a study that shows 60 percent of businesses think cyber risks are very high for them, but 31 percent still have no Cyber Liability Insurance whatsoever.You might be...
View ArticleiOS Malware Accesses Devices through Third-Party App Stores
Apple earned its sterling reputation for device security in part because iOS hadn't been hacked by malware. However, the company's reputation recently took a hit when a new strain of malware called...
View ArticleGetting Government Contracts: What Not to Do
Advisen reports that there's been a massive data breach affecting tens of thousands of government employees. When US Investigation Services – a longtime government contractor specializing in background...
View Article