About Adam K Levin | Contact | Videos

Author Archives: Adam Levin


  • Wetware: The Major Data Security Threat You’ve Never Heard OfColumn, Data Security, Blog

    Share

    For the first time, according to a recent study, criminal and state-sponsored hacks have surpassed human error as the leading cause of health care data breaches, and it could be costing the industry as much as $6 billion. With an average organization cost of $2.1 million per breach, the results of the study give rise to a question: How do you define human error? More than half of the respondents in the Ponemon Institute’s Fifth […]

  • This Mother’s Day Should You Press Flowers or Fraud Charges?Personal Finance

    Share

    Mother’s Day is a special time to celebrate all those kisses and hugs, the rides to the mall, the doctors’ appointments, the countless soccer-basketball-baseball games, a special note tucked into a pocket or care package sent to camp. But remember sometimes it’s what a person doesn’t do that matters, and some moms are just bad to the bone. More than 30% of identity theft cases involve a family member or close friend. The reason is […]

  • Can Smart Cities Stop Hackers?Column, Blog

    Share

    A monster storm is on a collision course with New York City and an evacuation is under way. The streets are clogged, and then it happens. Every traffic light turns red. Within minutes, the world’s largest polished diamond, the Cullinan I, on loan to the Metropolitan Museum of Art from the collection of the British Crown Jewels, is whisked away by helicopter. While this may sound like the elevator pitch for an action film, the […]

  • The Social Security Number is Dead. Long Live the Social Security Number?Column, Blog

    Share

    I am a senior citizen. While this distinction entitles me to a variety of perks like discounted movies and bus fare – as well as the occasional free doughnut (seriously) — it’s also a ticket to the identity theft lottery. Turning 50 gets you an invitation to AARP and turning 65 gets you a Medicare card. What’s this have to do with identity theft? Take a close look at a Medicare card. The identification number? […]

  • Should We Kill the Social Security Number?Column, Blog

    Share

    While tax season is still producing eye twitches around the nation, it’s time to face the music about tax-related identity theft. Experts project the 2014 tax year will be a bad one. The Anthem breach alone exposed 80 million Social Security numbers, and then was quickly followed by the Premera breach that exposed yet another 11 million Americans’ SSNs. The question now: Why are we still using Social Security numbers to identify taxpayers? From April […]

  • Last-Minute Tax Filers: Beware of This Obamacare ScamPersonal Finance

    Share

    For all stripe of rip-off artist, tax season might as well be called open season. Scams are legion, and navigating a solution after the fact can be somewhere between maddening and negotiating an Iran deal that everyone likes. Last month the IRS issued a warning that received scant attention from the media, but nonetheless could impact millions of taxpayers this year — particularly targeting low-income, elderly and Spanish-speaking taxpayers. The scam takes advantage of the […]

  • It Took Just One Email to Compromise the Leaders of the Free WorldColumn, Blog

    Share

    Whether an autofill mishap or a “What in the name of God were you thinking?” move, somebody’s shrimp is on the barbie at Australia’s immigration department after an officer there emailed President Obama’s passport number and other personal information to an organizer at the Asian Cup football tournament. And before you think otherwise: Yeah, it matters. An Australian freedom of information request recently revealed that the personally identifiable information (PII) of many of the world […]

  • How This Federal Data Breach Law Could Actually Hurt ConsumersColumn, Data Security, Blog

    Share

    With each passing brand name mega-breach—Home Depot, Target, JPMorgan Chase, Anthem—it becomes ever more urgent for government and industry to get on the same page about how to protect consumers. Sadly, not all laws are created equal, and there are few better examples of this homespun truth than a would-be federal law currently wending its way through Congress. And not to put too fine a point on it, the Data Security and Breach Notification Act […]

  • The New Grave Robbers: Identity ThievesColumn, Blog

    Share

    Take your driver’s license out of your wallet. Flip it over. Now look carefully at the back of it. There’s no box to check for “Identity Donor.” Yet when it comes to identity-related crimes, one of the greatest times of vulnerability is immediately after you die. You can do everything right. You can use long and strong passwords and account-unique user names. You can check your financial accounts and monitor your credit on a regular […]

  • Should the Secret Service Protect Candidates Online?Column, Data Security, Government

    Share

    The Democratic and Republican gristmills got to work last week on Hillary Clinton’s “homebrew” email, and the ensuing firestorm underscored an alarming lack of cyber-savvy among the leading players of the 2016 election. It also raised a serious question: Should the Secret Service protect presidential candidates against cyber attack? News of Hillary Clinton’s use of a private email service, @clintonemail.com, hosted from her home in Chappaqua, N.Y., spread fast last week. The State Department commented […]

LOAD MORE ARTICLES