Is Your VPN Leaking Your Info?
Net Neutrality is dead and the Internet is increasingly a playground for data mining schemes, social networks, and identity thieves. The possibility of true online privacy has never seemed more...
View ArticleAre You Helping an ID Thief Get a Credit Card?
You can spot a Nigerian email scam without opening it. You know what you’re doing when it comes to keeping ID thieves from conning you. And if someone tried to get the kind of personal information...
View Article5 Ways Brokers Can Maximize Their Voluntary Employee Benefits Portfolios
By Denise SzottBrokers, now more than ever, need a proactive strategy to help employer clients meet a growing demand for enhanced employee benefits.To do so, brokers must be ready to leverage their...
View ArticleSo, you took one of those Facebook Personality Quizzes. Now What?
Who is Cambridge Analytica?Cambridge Analytica is a voter profiling consulting firm that used data mining and psychographic targeting for political campaigns, most notably for Donald Trump’s 2016...
View ArticlePrivileged Access Could Be a Company Killer
It doesn’t matter how many times you tell employees not to share passwords. A new study suggests many people are still going to do it.The 2018 Privileged Access Threat Report, recently published by...
View ArticleGet Ready for More Data Scraping Stories
Don’t be surprised if the Cambridge Analytica/Facebook story turns out to be merely the first in a long line of stories to come about the abuse of consumer data purloined from social media.ZDnet...
View ArticleCybercrime Payout Equal to the GDP of Russia
Cybercriminals are earning more than ever before, with an annual haul of $1.5 trillion according to a new study conducted by Dr. Michael McGuire, a senior lecturer in criminology at the University of...
View ArticleMoving in the Right Direction: New NIST Best Practices for Cyber
The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has released its first major revision to their standards and best practices for cybersecurity policy this...
View ArticleDoes Anyone REALLY Know the Difference Between a Data Breach, Compromise,...
Do you? Currently and depending on who is speaking, there are varying and frequently opposing answers – even among experts – leaving consumers grasping for a better understanding of what it means for...
View Article5 ways to address election system weaknesses for cities and counties
The front lines in defending the security and privacy of voting against enemies include the localities who manage the voting precinct on election day. The cities and counties need to be just as...
View ArticleTwo-Factor Authentication Can’t Stop This Phishing Attack
KnowB4’s chief hacking officer Kevin Mitnick released a video that should send shudders down the spine of anyone using 2-factor authentication.Implementing a standard attack mode, in this case a...
View ArticleCan Larry Ellison Topple Jeff Bezos by Becoming a Cybersecurity Champion?
If you don't think cybersecurity is a selling point these days, you're probably not doing as well as you could be--no matter what it is you do in digital. Larry Ellison is dialed into this new home...
View ArticleAnd Now for Something Entirely Different: Another Facebook Compromise
It would be easy to confuse recent news that data belonging to 3 million Facebook users was exposed online with the Cambridge Analytica debacle that involved 87 million users. Both stories have their...
View ArticleGoogle Location Data Grabs in the Crosshairs
U.S. Senators Richard Blumenthal (D-CT) and Edward Markey (D-MA) have formally requested the FTC to begin an investigation into Google for tracking the location of Android users.The request follows...
View ArticleCalifornia Ballot Initiative Proposes Consumer Privacy Reform
A ballot initiative was recently proposed in California to give consumers privacy rights similar to those granted by the EU’s General Data Protection Regulation. The initiative, called the California...
View Article3 Hidden Traps in the GDPR and How to Avoid Them
The EU’s new data privacy regulation contains many pitfalls. We think you should be most aware of these three.Enforcement of the European Union’s General Data Protection Regulation just days...
View ArticleWhat U.S. Businesses Need to Know About the GDPR
For privacy and cyber security advocates, the GDPR represents a watershed moment, but precisely how this new law will play out in the marketplace is anyone's guess. It's been crystal clear from the...
View ArticleHow Brokers Can Seize Cyber Opportunities
Cyber crime is an unwelcome reality for millions of people in the United Kingdom—one that is creating new opportunities for insurers and brokers, according to the Cyber Research 2018 survey conducted...
View ArticleWorse than Cambridge Analytica: The Securus Hack
A data privacy scandal of far greater magnitude than Cambridge Analytica was reported this month, and while it gets worse with each new emerging detail, it’s getting nowhere near the same coverage.As...
View ArticleThreat Level Rising: What You Need to Know About Ransomware
Simple tools. Ominous results. Ambitious cyber criminals launched devastating ransomware attacks in 2017, taking in billions of dollars and disrupting businesses around the world.As ransomware becomes...
View Article
More Pages to Explore .....