4 Resources to Help You Track Your Hacks
If you’re a security expert or IT consultant, one of your professional responsibilities is to keep track of the security threats that could cause data breaches on your clients’ networks. Because the...
View ArticleOpenSSL Made Less Than a Part-Time Fast Food Worker
If there's an upside to the whole Heartbleed debacle, it's that the media drew attention to an incredible disparity: the group that works on OpenSSL gets less than $2,000 dollars a year to maintain the...
View ArticleGood News for Your Clients: Cyber Coverage Is Expanding
Insurance Journal reports that some insurers are beefing up their Cyber Liability Insurance in order to offer coverage for physical damage and injuries caused by cyber attacks.The news is important...
View ArticleU.S. Government: Watch Out for Chinese Hackers and Data Thieves
You've probably heard a few news stories about hackers who work for the Chinese government and steal intellectual property from US firms. And you've probably wondered whether or not you should take...
View ArticleApple Award for IP Patents Carves Out More IT Case Law
Lawsuits are something no one likes talking about. They can happen to any business and are hard to plan for. But because people don't talk much about them, there's a lot of confusion about what a...
View ArticleSymantec Says Antivirus Software Is Dead. What This Means for Your Clients
Security company Symantec declared in a recent Wall Street Journal article that antivirus software – one of its main products – is "dead," implying it is practically useless at deterring cyber attacks....
View ArticleWhat Google's Investment Means for the Future of BYOD
BYOD is an industry buzzword and a source of much anxiety among IT departments. When employees bring their own devices to work, it creates headaches and major security concerns for the IT contractors...
View ArticleHome-Grown Data Breaches: How the Internet of Things Is Increasing Your Exposure
The investment resource site MotleyFool reports that Apple announced it would produce software designed to work with the Internet of Things, joining its competitors Google, Microsoft, and Samsung in...
View Article$4.8 Million HIPAA Settlement Over Data Breach Is Largest to Date
The National Law Review reports that the Office of Civil Rights (OCR) recently required two New York healthcare organizations to pay a joint $4.8 million settlement, the largest ever for a HIPAA data...
View ArticleSpotify Hack Shows BYOD Risks and Small Data Breach Costs
The Washington Post reports that Spotify – one of the leading online radio and music streaming services – was hacked, and though initial reports suggest that the data breach was an extremely small one,...
View ArticleCourt Ruling: Cyber Security Is Super-Duper Important
Insurance Journal reports on a court case that confirms what we in the insurance business have warned our customers about for a long time: while General Liability Insurance covers many lawsuits, it...
View ArticleRe: Your Recent Spear Phishing Attack
Unless you're an IT professional who lives in Hawaii, most of the time you say the phrase "spear phishing" when you're referring to an email that looks friendly but really contains malware. If you are...
View ArticleIt's Not Just You: Data Breaches Are Getting Sneakier
Symantec has released its 2014 Internet Security Threat Report, compiling data on trends in email security and cyber risk over the last two years. Here are some of the key findings:Malicious email...
View ArticleJuly Is Beach Season – And Breach Season (but Not Breech Season)
Symantec's study on data breaches, the 2014 Internet Security Threat Report, provides scores of useful and fascinating statistics on data breaches, including this shocker: July is peak season for data...
View Article55% of Small Businesses Might Want to Hire You
The Boston Globe reported earlier this month on an unbelievable small business statistic: 55 percent of small businesses don't have a website. Yeah. Despite the fact that it's 2014 and Elon Musk has...
View ArticleCyber Crime Costing Almost as Much as Drug Crime
The Center for Strategic and International Studies has issued a report on the total cost of cyber crime, and what it found is astonishing. According to the Washington Post, this report (sponsored by...
View ArticleGoogle's "End-to-End" Like a Seatbelt for Email
For a long time, transportation safety advocates knew that seatbelts would save lives. However, it wasn't until the 1960s that manufacturers were required to install them in cars, and it wasn't until...
View ArticleDo We Need a Miss Manners of Data Breaches?
At her peak, Judith Martin, aka Miss Manners, wrote a popular advice column that was featured in over 200 newspapers. She helped guide many hapless people through difficult social situations – and some...
View ArticleLinkedIn Lawsuit: Courts Catching Up with Tech
Insurance Journal reports that tech companies may be on the hook for more lawsuits as a federal judge ruled that LinkedIn can be sued for its email and data collection policies. A lawsuit against a...
View ArticleWhy Passwords Matter: The Tricky World of Cyber Insurance
The Columbus Dispatch reports that insurance companies don't yet have reliable models for calculating client cyber risk, so it's hard for them to write policies that cover all the exposures a client...
View Article