Why Passwords Matter: The Tricky World of Cyber Insurance
The Columbus Dispatch reports that insurance companies don't yet have reliable models for calculating client cyber risk, so it's hard for them to write policies that cover all the exposures a client...
View ArticleLinkedIn Lawsuit: Courts Catching Up with Tech
Insurance Journal reports that tech companies may be on the hook for more lawsuits as a federal judge ruled that LinkedIn can be sued for its email and data collection policies. A lawsuit against a...
View ArticleDo We Need a Miss Manners of Data Breaches?
At her peak, Judith Martin, aka Miss Manners, wrote a popular advice column that was featured in over 200 newspapers. She helped guide many hapless people through difficult social situations – and some...
View ArticleYo App Hacked
The BBC reports that one of the silliest and least useful apps of all time – a messaging service called Yo – has major security flaws. That's not really accurate. To say that Yo has "security flaws" is...
View ArticleNeed a Revenue Boost? Think Hedge Funds
According to Digital Journal, hedge funds – the high-profile investment firms – are the latest industry to recognize their cyber exposure and could be a great source of new clients for IT...
View ArticleTerrifying New Android Malware Is Basically a Brain Parasite for Smartphones
It's easy to overreact about new cyber threats, but as ThreatPost reports, a piece of fledgling Android malware is pretty much a brain virus that might create an army of infected zombie smartphones...
View ArticleHow Florida's New Data Breach Law Could Cost Tech Businesses
As the federal government hems and haws its way through new data breach legislation, states are springing into action to pass their own, tougher data breach laws – it’s just happened in Florida where...
View ArticleHotel Hippo Closure Would Be a Wakeup Call for Small Businesses (If Anyone...
SCMagazine reports that hotelhippo.com, a hotel reservation site, has shuttered after poor security led to a data breach.Though the company was small and only 24 customers were affected, the data...
View ArticleWhat the Apple-IBM Partnership Means for IT Professionals
ZDNet reports that IBM and Apple are partnering to develop mobile products for businesses, effectively combining Apple's iPad and iPhone infrastructure with IBM's device security and big data...
View ArticleMobile Security Update: 1 in 10 Android Apps Is a Virus
HackSurfer reports on the sorry state of cyber security on the Android platform where 1 in 10 apps contains malware. Yikes.You read that correctly: 10 percent of Android apps are malware. Over the last...
View ArticleIT Professional's Firing Would Have Been a Lawsuit for an IT Contractor
The Arizona Republic reports that Miguel Corzo, a community college IT employee who had been working in the district for 30 years, has been fired after his actions led to a data breach that has already...
View ArticleCalifornia Data Breach Law Raises as Many Questions as It Answers
IT consultants are subject to a variety of state laws. Your legal responsibilities change from state to state, and each new court ruling – such as the one that just occurred in California – can...
View ArticleClass Action Suit against eBay over Data Breach Seeks $5 Million in Damages
As Computer World reports, a newly filed lawsuit against eBay shows how data breaches are becoming big business for lawyers.The breach, which was discovered in February, has led to a $5 million class...
View ArticleWhen Deleting Malware Isn't Enough
Citadel, a particularly potent strain of banking malware, has been pestering IT security consultants for the last two years. ThreatPost reports that the latest strain has found a way to return to...
View ArticleMega-Breach Is an Excellent Client Education Opportunity
When Target's data breach hit the front pages, many small-business owners saw it as evidence that hackers only go after big business. But the latest – and largest– data breach, which stole 1.2 billion...
View ArticleBlack Hat Security Conference: Hackers Can Steal Your Car
Last week's Black Hack security conference brought exposure to countless security flaws in nascent Internet-of-Things technology. CBS News reports that security consultants have found ways to...
View ArticleOld Technology Is a Cyber Liability
In last week’s blog post, "Black Hat Security Conference: Hackers Can Steal Your Car,” we looked at how new technology – the Internet-of-Things and Internet-enabled cars – exposed consumers to greater...
View ArticleCDD Complaint Suggests We're in the "Wild West" Stage of Digital Privacy
ITworld reports on a brewing data security dispute between a group of 30 U.S. companies and the privacy watchdog Center for Digital Democracy. Companies such as AOL and Adobe have been accused of not...
View ArticleCDD Complaint Suggests We're in the "Wild West" Stage of Digital Privacy
ITworld reports on a brewing data security dispute between a group of 30 U.S. companies and the privacy watchdog Center for Digital Democracy. Companies such as AOL and Adobe have been accused of not...
View ArticleStudy: Half of Businesses Will Hire IT Security Contractors by 2018
A study recently published by technology research firm Gartner shows that spending on IT security has increased 7.9 percent so far in 2014, to $71.1 billion. Based on trends, the firm predicts that...
View Article