About Adam K Levin | Contact | Videos

Author Archives: Adam Levin


  • Worried About Hackers? Surf the Web with Your MomColumn, Blog

    Share

    An old Chinese proverb says: “There is only one beautiful child in the world, and every mother has it.” But there are times when people test that mother-child connection, turning their “matron” saints into judge, jury and even warden. Increasingly, various stripes of online scoundrel can act as a catalyst for the above transformation. As we all know, despite that spiel about unconditional love, there is no end of things a son or daughter can […]

  • Identity Theft: A Real-World Version of ‘The Walking Dead’Column, Blog

    Share

    In the post-apocalyptic world of “The Walking Dead,” it’s a foregone conclusion that zombies happen, and they aren’t picky. One real-world parallel of finding yourself surrounded by hungry zombies is the plague of identity theft. With more than 1 billion records “out there,” it’s just a matter of time before you get got. When it comes to identity theft, people have many questions and few answers. Should I shred sensitive documents? (Yes.) Is it worse […]

  • The CIA Director Got Hacked Because of Data Breach FatigueColumn, Blog

    Share

    “He’s supposed to be so high in the government. Head of CIA. He should be more clever.” Those are the words of an alleged hacker from a self-styled “operation” called CWA—Crackas With Attitudes—in conversation with CNNMoney’s Laurie Segall. The alleged hackers accessed sensitive information stashed in the private email accounts of Homeland Security Secretary Jeh Johnson and CIA Director John Brennan. As it stands now, the FBI and the Secret Service are looking into claims […]

  • Physician Heal Thyself: Are Your Medical Records Safe?Column, Blog

    Share

    According to an article in Tech Times, healthcare providers in the U.S. may lose $305 billion in the next five years due to cyberattacks. One way those attacks keep happening: BYOD, or bring your device to work. One definition of insanity, according to Einstein (and my chief content officer Michael Schreiber), is to do the same thing, over and over, expecting a different result. Well, when it comes to cybersecurity, the precautions one can take […]

  • The Defense Question We Should Continue Debating: CybersecurityColumn, Blog

    Share

    It doesn’t matter if they are state-sponsored or live in their parents’ basement. Hackers thrive in the shadows of our culture. Leaders hesitate to declare supremacy over them lest they get taught a very public lesson in humility. But, if a superpower uses those hackers to access a foreign government’s information, and that’s not an act of war, what next? Jim Webb, a heavily decorated war veteran, tried to get his fellow presidential hopefuls to […]

  • Does Your Airline Really Understand Data Security?Column, Blog

    Share

    A friendly reminder to organizations in regular communication with the public: You never know who John Q. Public is; for example, it could be me—Adam K. Levin. (Not to be confused with the singer of the almost same name—Adam Levine.) But there are a bunch of Adam Levins, which is why my middle name (Kenneth) and initial (K) actually matter. Here’s the short version of my recent saga with American Airlines. The name on my […]

  • 6 Cybersecurity Best Practices for Companies Looking to Protect Their DataData Security, Blog, Technology

    Share

    In my forthcoming book, Swiped, partially excerpted below, I examine some of the enterprise level, cybersecurity best practices. These are the questions organizations need to ask themselves if they want to protect the data they are sitting on. Some of the considerations: Does the organization use a standards-based security architecture that is integrated into all technology processes? In plain language, sending personal information via attachment on an email is a “technology process.” This would include […]

  • How to Master Your Credit Score without a Trial By FireColumn, Blog, Personal Finance

    Share

    I was visiting a house of worship last Sunday – no, I didn’t have to wear a name tag – and while listening to Pastor Ryan (who coincidentally is also a lawyer) talk about the ways in which one can gain wisdom, the life lesson he discussed has applications far beyond the realm of morality or matters more spiritual. In particular, I was struck by a three-part prescription at the center of his sermon that […]

  • How to Keep Scammers From Pulling an Identity Theft Double WhammyColumn, Blog

    Share

    When it comes to data security and the real-life impact of identity theft, public awareness is at an all-time high. But there is still great confusion and ignorance about what it is, how it happens, and what can be done to avoid the pitfalls of life after a data breach or personal compromise. Most of us still feel flummoxed—and perhaps a bit panicked—when we get a phone call, an email or a letter saying our […]

  • The Medical Identity Theft Apocalypse? Fear the Walking FilesPersonal Finance

    Share

    Criminal cyber attacks on healthcare information repositories have increased 125% since 2010. With the announcement of the Excellus breach last week, the total number of big-headline medical information compromises reported in 2015 (such as Anthem, Primera, Carefirst) had crossed the mind-blowing demarcation line of 100 million files. The Excellus breach exposed the names of clients as well as their dates of birth, Social Security numbers, mailing addresses, telephone numbers, member identification numbers, financial account information […]

LOAD MORE ARTICLES