The Federal Trade Commission (FTC) “it is challenging the public to create an innovative tool that will help protect consumers from security vulnerabilities in the software of home devices connected to the Internet of Things.” The FTC announcement on January 4, 2017 was entitled “Challenge to Combat Security Vulnerabilities
New email law which gives employees an after hour a ‘right to disconnect’ – good or bad idea?
Computerworld reported that the “French law took effect Jan. 1 and requires firms with more than 50 employees to negotiate a “disconnection” rule governing after-hour and vacation communications.” The January 6, 2017 report entitled “Why France’s new ‘right to disconnect’ law matters” included this comment that emails “arriving…
BIG SURPRISE! – Fraud and identity theft a real problem for online dating sites!
The FBI announced that “John Edward Taylor allegedly trolled dating websites to find unsuspecting women for his ‘romance’ scam, designed to steal their money.” The January 3, 2017 FBI news release entitled “Alleged Confidence Man Charged With Luring Victims Through Matchmaking And Networking Sites To Commit Fraud And Identity…
Continue Reading BIG SURPRISE! – Fraud and identity theft a real problem for online dating sites!
Privacy Laws will likely cause conflicts with Big Data in 2017
Privacy concerns regarding big data were highlighted by the Federal Trade Commission report entitled “Big Data: A Tool for Inclusion or Exclusion? Understanding the Issues” in January 2016 and will grow in importance given the predicted growth of big data reported by Infoworld which included a report that…
Continue Reading Privacy Laws will likely cause conflicts with Big Data in 2017
Cybersecurity Report Card for 2016: Overall “C-“ but bad news since the Cloud gets a “D-“ and Mobile gets an “F”!
Tenable Network Security surveyed “700 security practitioners across seven key industry verticals and nine countries” that produced “a single report card score that represents overall confidence levels of security practitioners that the world’s cyber defenses are meeting expectations.” The “2017 Global Cybersecurity Assurance Report Card” from Tenable with…
CYBER & TECHNOLOGY Ups and Downs in 2016 – Encryption a Big Success, but Fake News a Big Failure
The New York Times reported the best and worse technology from “exploding smartphones and hoverboards to the proliferation of fake news on social media, many of our tech hardware, software and web products suffered embarrassing failures.” The December 14, 2016 article entitled “Biggest Tech Failures and Successes of 2016…
Another Cyberattack at Southwest Airlines?
Southwest’s website was down for about 3 hours so Southwest tweeted that “We are aware and investigating current issues with our website, and we have implemented flexible accommodations for those being affected.” The Dallas News report from December 21, 2016 entitled “Southwest Airlines suffers website outage; airport operations unaffected…
GUEST BLOG: In the wake of Yahoo’s CONFESSION it’s time for you learn about 2-factor authentication!
My Guest Blogger Eddie Block (CISSP, CIPM, CIPP/G, CISA, CEH) is a senior attorney in Gardere’s Litigation Group and member of the Cybersecurity and Privacy Legal Services Team who focuses on all aspects of information cyber security, including credentialing functions, firewall and IDS deployment and monitoring, and penetration testing, and…
Take a minute and read Yahoo’s 238 word CONFESSION about the Cyber theft of 1+ billion user accounts!
Yahoo’s public confession entitled “Important Security Information for Yahoo Users” about the August 2013 theft of “data associated with more than one billion user accounts” including “the stolen user account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (using MD5) and, in…
Companies without Incident Response Plans (IRPs) may not be able to get Cyber Insurance!
The National Association of Insurance Commissioners (NAIC) Cybersecurity Task Force reported that insurance companies “will probably want to see the business’ disaster response plan and evaluate it with respect to the business’ risk management of its networks, its website, its physical assets and its intellectual property.” The November 17, 2016…