About Adam K Levin | Contact | Videos

Author Archives: Adam Levin


  • Your Identity Portfolio Can Make or Break YouData Security, Identity Theft

    Share

    No matter how good or lucky the investor, no one beats the market 100% of the time—unless, of course, you are Bobby Axelrod. There is, however, an investment portfolio that is somewhat more predictable. It works along similar lines, but it is possible to exercise significantly more control over it than equities. I’m talking about your identity portfolio. I’ve written elsewhere about your credit portfolio, which can be a wealth-builder or a weapon of individual […]

  • Cyber wall

    The National Security Nightmare the Candidates Aren’t DiscussingData Security, Politics

    Share

    Whether you love it, or it makes you want to move south of the border, Donald Trump’s Great Wall of Mexico is an idea whose time has come. That said, the Republican presidential candidate has a few things wrong. First, The Donald’s wall is misnamed. It should be called the Great Cyber Wall of America or the American Cyberdome or, at any rate, something denoting a digital information and communication protection system. The second thing […]

  • Credit report

    The Best Investment You Have: Your CreditFinancial Literacy, credit

    Share

    When it comes to investments, there is no end to the commentary about the best ways to do it. Often there is substantial risk. But that isn’t always the case. In fact, there’s one portfolio that could be the deciding factor on whether you go on that family vacation, buy a new car or retire early — and it requires no capital at all. The portfolio I’m talking about is not affected by daily stock […]

  • Donald Trump

    Would Gawker Be Able to Punk President Trump?Politics

    Share

    On the Sunday before Super Tuesday, Donald Trump did something that would have been a serious misstep for any other campaign, and yet it was lost in conversations about renounced, or un-renounced, KKK endorsements and Hillary Clinton’s rout of Bernie Sanders in South Carolina. What happened was simple. Mr. Trump retweeted a quotation that had been tweeted at him a little after six in the morning. The quotation in question certainly sounded like something The […]

  • How Tim Cook Is Securing Steve Jobs’s Legacy with EncryptionColumn, Data Security, Blog

    Share

    Steve Jobs understood what people want. His insistence on making hard things easier — for instance, using a personal computer — was an essential part of the Apple success story. Apple CEO Tim Cook has been doing the same thing — but now the “hard thing” is privacy and encryption. Apple has consistently earned top marks for its privacy and data security policies. That said, since the San Bernardino shooting, which left 14 dead and […]

  • Why Hillary Clinton’s Emails Matter This YearColumn, Data Security, Blog

    Share

    There is no shortage of punditry about former Secretary of State Hillary Clinton’s homebrew server, and the resulting fallout, aka “Emailgate.” Whether you read the commentary dedicated to killing her candidacy, or calmer voices focused on the bigger picture of national cybersecurity, Secretary Clinton gets failing marks — and rightly so. Unlike some of Secretary Clinton’s critics, I don’t believe that the email controversy is, first and foremost, proof of some deep character flaw that […]

  • 8 Travel Tips for a Scam-free VacationPersonal Finance

    Share

    Punxsutawney Phil didn’t see his shadow this year, which means spring is right around the corner. For the winter weary, however, summer is still too far away and the lure of blue-green seascapes under sunny skies is strong. If you’ve decided to take the plunge, remember: Your vacation is supposed to be a time to unwind. Unfortunately, there are thieves who make a living off your relaxation—waiting for your guard to be down. That’s why […]

  • Identity Theft Is Dead. Long Live Identity Theft!Column, Blog

    Share

    Incidents of identity theft held fairly steady last year, according to a new report by Javelin Strategy and Research. It would seem with time-honored methods of ripping people off going the way of Bonnie and Clyde, fraudsters — ever sophisticated, creative and persistent — scrambled to find new ways to increase revenues in 2015. Of course, they did. They always do. If I could drive one point home after reading the latest Javelin report, “2016 […]

  • Why the IRS Should Push Tax Day to June 15Column, Blog

    Share

    The only way to stop tax refund fraud is to change the way the tax filing and refund system works, and while this may be a painful process for employers and taxpayers alike, it’s necessary. The Problem With Data Unless you’ve been hiding out in the Unabomber Suite at the Loon Lake Lodge, you know that data-related crimes are legion, but what you may not know is that data-related tax fraud specifically is increasing geometrically. […]

  • How Mega-Breaches Could Literally Kill YouColumn, Blog

    Share

    It was not very long ago that information shared with your doctor was sacrosanct, at the same remove from exposure as utterances made under the protection of an attorney-client relationship or pillow talk in a spousal bed. That may no longer be the case — and the fallout could be life-threatening. Unless you are living off the grid in a log cabin on Loon Lake, you have heard about the mega-breaches responsible for this paradigm […]

LOAD MORE ARTICLES