What Google's Investment Means for the Future of BYOD
BYOD is an industry buzzword and a source of much anxiety among IT departments. When employees bring their own devices to work, it creates headaches and major security concerns for the IT contractors...
View ArticleHome-Grown Data Breaches: How the Internet of Things Is Increasing Your Exposure
The investment resource site MotleyFool reports that Apple announced it would produce software designed to work with the Internet of Things, joining its competitors Google, Microsoft, and Samsung in...
View Article$4.8 Million HIPAA Settlement Over Data Breach Is Largest to Date
The National Law Review reports that the Office of Civil Rights (OCR) recently required two New York healthcare organizations to pay a joint $4.8 million settlement, the largest ever for a HIPAA data...
View ArticleSpotify Hack Shows BYOD Risks and Small Data Breach Costs
The Washington Post reports that Spotify – one of the leading online radio and music streaming services – was hacked, and though initial reports suggest that the data breach was an extremely small one,...
View ArticleCourt Ruling: Cyber Security Is Super-Duper Important
Insurance Journal reports on a court case that confirms what we in the insurance business have warned our customers about for a long time: while General Liability Insurance covers many lawsuits, it...
View ArticleRe: Your Recent Spear Phishing Attack
Unless you're an IT professional who lives in Hawaii, most of the time you say the phrase "spear phishing" when you're referring to an email that looks friendly but really contains malware. If you are...
View ArticleCyber Crime Costing Almost as Much as Drug Crime
The Center for Strategic and International Studies has issued a report on the total cost of cyber crime, and what it found is astonishing. According to the Washington Post, this report (sponsored by...
View ArticleGoogle's "End-to-End" Like a Seatbelt for Email
For a long time, transportation safety advocates knew that seatbelts would save lives. However, it wasn't until the 1960s that manufacturers were required to install them in cars, and it wasn't until...
View ArticleWhy Passwords Matter: The Tricky World of Cyber Insurance
The Columbus Dispatch reports that insurance companies don't yet have reliable models for calculating client cyber risk, so it's hard for them to write policies that cover all the exposures a client...
View ArticleWhy Passwords Matter: The Tricky World of Cyber Insurance
The Columbus Dispatch reports that insurance companies don't yet have reliable models for calculating client cyber risk, so it's hard for them to write policies that cover all the exposures a client...
View ArticleSharing Is Caring: The Future of Cyber Security
Insurance Journal reports on a potential cyber security law being discussed in Congress that could protect consumers and businesses from the risks of lost data.Of course, in Congress, nothing is ever...
View ArticleLinkedIn Lawsuit: Courts Catching Up with Tech
Insurance Journal reports that tech companies may be on the hook for more lawsuits as a federal judge ruled that LinkedIn can be sued for its email and data collection policies. A lawsuit against a...
View ArticleDo We Need a Miss Manners of Data Breaches?
At her peak, Judith Martin, aka Miss Manners, wrote a popular advice column that was featured in over 200 newspapers. She helped guide many hapless people through difficult social situations – and some...
View ArticleYo App Hacked
The BBC reports that one of the silliest and least useful apps of all time – a messaging service called Yo – has major security flaws. That's not really accurate. To say that Yo has "security flaws" is...
View ArticleTechnology vs. Laws: Rideshare Edition
The Pittsburgh Post-Gazette reports on the difficulty ridesharing companies such as Lyft and Uber have had as regulators struggle to decide which laws apply to this new service. Regardless of where you...
View ArticleDefense Against the Hacking Arts Requires CONSTANT VIGILANCE
According to ThreatPost, researchers have found a way to bypass PayPal's two-factor authentication an enhanced security feature recommended by many security experts. This proves – much like in the...
View ArticleData Security Turbulence: New Attacks Target Airport Security
The security and risk management site CSO Online reports that 75 U.S. airports have been affected by cyber attacks, and four airports received "advanced persistent attacks" – a sign that hackers are...
View ArticleHow Tech Illiteracy Could Cost You Thousands
During the recent Supreme Court hearing over Aereo, the Internet-streaming TV service, it became clear that the Supreme Court (and the legal system in general) knows very little about technology....
View ArticleTerrifying New Android Malware Is Basically a Brain Parasite for Smartphones
It's easy to overreact about new cyber threats, but as ThreatPost reports, a piece of fledgling Android malware is pretty much a brain virus that might create an army of infected zombie smartphones...
View ArticleHow Florida's New Data Breach Law Could Cost Tech Businesses
As the federal government hems and haws its way through new data breach legislation, states are springing into action to pass their own, tougher data breach laws – it’s just happened in Florida where...
View Article