Articles

Preparing for the New Year in Cybersecurity

A new FireEye survey is out this month, and it’s interesting, so I wanted to look in to it, and compare it to the Avertium study we covered last time.  One part that stuck out is that this study is even more optimistic about increasing cybersecurity spending.  The latter figure was from approximately half of… Read More

How confident are you in your cybersecurity readiness?

According to more than half (52%) of the respondents to an Avertium survey, their organization plans to expand their cybersecurity teams in 2020—including both employees and outside consultants. Another result from the study is interesting in that they reveal how human error remains as concerning an issue as it always has been.  Specifically, phishing and… Read More

Dangerous stalkerware creeps into people’s lives and homes

Here’s a story fit for the season, although it’s definitely not fun and games.  There are all kinds of dangerous and harmful apps out there, just waiting to infect your phone or computer with malicious malware.  Apple and Google have recently needed to remove several dozen compromised apps from their mobile stores, apps that use… Read More

CaCPA to give consumers more control over their data

As long as there has been a lack of a singular national standard in the US for data privacy law, states have been individually filling the void with their own legislation.  California has been one of the leading states on cybersecurity policy, and their recent California Consumer Privacy Act (CaCPA), effective as of next January,… Read More

Evolving phishing schemes pose new risks to cybersecurity

Email is perhaps the single most crucial attack vector in cybersecurity today.  According to Verizon’s latest Data Breach Investigations Report, email is the channel used in 94% of attacks where hackers target executives for phishing schemes.  Phishing remains as culpable as ever in data breaches, and based on new insight from Carbon Black and Symantec,… Read More

DoorDash, Zynga, and EA Data Breaches

I hesitate to say this, because I know how influential we are and that their future IPO may take a hit, but I…don’t use DoorDash. *whisper whisper* What’s that?  ……McDonald’s partnership? Oh, ok then, they’ll be just fine. But for those who do use the food delivery service, there is now unfortunately another thing for… Read More

Best Practices for Data Security

Cybersecurity is a more important field today than ever before.  Let’s just get that established right away.  Threats to personal data abound from without and within: hackers who target and infiltrate networks, insiders and employees who, intentionally or not, compromise their organization’s security posture.  It is imperative that plans be made and reviewed in advance. … Read More

New Ransomware, New Attitudes

Characters in fiction usually have a dark foil as an antagonist.  Superman and Bizarro, Frodo and Gollum, Jerry and Newman.  But what about encryption?  For as heroic as it is and the good it does, what happens when we come up against the dark side of encryption? Yeah, ok, that sounds cheesy.  It is, however,… Read More

Cybercrime Activity Up Across the Board

The studies are out, the results are in, and according to Risk Based Security, this year is trending to be the worst ever for data breach activity.  We are now almost three quarters of the way through 2019, and by now the number of breaches is up 54% over 2018, totaling 4.1 billion exposed records… Read More

Managing Insider Threats with Vigilance

Two factors continue to be substantial risks to personal data in an enterprise environment: insider access and third-party breaches. According to the latest Verizon’s Data Breach Investigations Report, the former accounts for 59% of all security incidents.  Now, it seems the Office of Civil Rights (OCR) has published its own report, a newsletter called “Managing… Read More

Top