About Adam K Levin | Contact | Videos

Author Archives: Guest Blogger


  • VPN

    VPNs prevent marketers, others from cashing in on your browser historyData Security, Privacy

    Share

    Virtual private networks are back in the spotlight. In March, Congress voted to repeal rules that would have required internet service providers to get customer permission to sell their web-browsing data. ISPs are now free to market valuable customer information, triggering concern among privacy advocates. Detailed behavior profiles created by ISPs could be particularly handy tools for marketers targeting those most vulnerable to predatory sales campaigns, including the poor and tech neophytes. “Further overreaching by […]

  • Cybersecurity experts cringe as Trump hands out his cell phone numberData Security, Politics

    Share

    The internet stirred earlier this week about the meaning of the word “Covfefe”—generated, one could guess, when the president fell asleep mid-tweet, phone in hand. But a more important Trump cell phone issue got far less attention. The Associated Press reported that Trump is giving out his cell phone number to world leaders so they can call him directly. Not only is this highly unusual, it creates plenty of security risks—not to mention public records issues. Earlier, […]

  • WannaCry

    Five best practices worth repeating in wake of WannaCry attackData Security

    Share

    In the world of cybersecurity—particularly for small- and midsize businesses—progress tends to be achieved in fits and starts. Rare is the SMB that has the patience and focus to take a methodical approach to improving network security over an extended period. So when news of the WannaCry outbreak grabbed the mainstream media’s attention recently, fear among SMBs spiked and attention turned to cyber issues. However, just as quickly, it seems, the pendulum appears to be […]

  • Health records

    Health care IT departments must defend against cyber attacks — and also the NSAData Security, health care

    Share

    Every successful cyber attack provides a learning opportunity for technologists. WannaCry provides two: Big organizations, particularly in health care, must learn to prioritize safety over compliance; and while doing that, they shouldn’t have to fight against American-made weaponry. For a long time, many health care providers have been worried about the wrong thing in cybersecurity—compliance rather than patient safety. With the WannaCry attack, we see the most frightening example yet of the devastating consequences. Last […]

  • cyberattack

    50 Ways to Avoid (or Deal With) a CyberattackData Security, Technology

    Share

    In case you missed it, a major cyberattack swept the globe Friday. Per pretty much every major news outlet here in the U.S., hackers locked computer systems worldwide, then threatened to destroy data if the victim did not pay to be let back in. In other words, they executed a large scale ransomware attack, targeting companies, government agencies, public institutions and ordinary citizens across continents. The attack comes just one week after Google Docs users […]

  • Ransomware

    Why WannaCry portends coming surge in attacks launched via self-spreading wormsData Security, Technology

    Share

    The landmark WannaCry ransomware attack, I believe, may have been a proof of concept experiment that inadvertently spun out of control after it got released prematurely. But now that it’s out there, WannaCry signifies two developments of profound consequence to company decision-makers monitoring the cybersecurity threat landscape: • It revives the self-propagating internet worm as a preferred way to rapidly spread new exploits, machine to machine, with no user action required. • It lights up […]

  • laptop ban

    Laptop Ban is a Cyber Hygiene Wake-up CallData Security

    Share

    Earlier this year, the U.S. Department of Homeland Security (DHS) instituted an electronics ban on flights in and out of the United States. As per DHS’s Fact Sheet “Electronic devices larger than a cell phone/smart phone will not be allowed to be carried onboard the aircraft in carry-on luggage or other accessible property. Electronic devices that exceed this size limit must be secured in checked luggage.” Between this, the Galaxy Note 7 restriction (fire on a plane […]

  • ransomware

    Ransomware plot line: Netflix hackers follow script that leads to moneyCybersecurity, Identity Theft

    Share

    TV show leak is good reminder for everyone to put their digital lives in order The premature release of the new season of “Orange is the New Black” by hackers is no big deal. Really. You can see why producers made the calculation that stopping the “hack” was not even worth the alleged $66,000 or so the hackers demanded as “ransom,” according to TorrentFreak. Why? Online show fans are very familiar with the restraint required […]

  • tax scam

    Tax-fraud scams don’t end with tax-filing seasonPersonal Finance, Identity Theft

    Share

    Many businesses and consumers are on high alert for tax-fraud scams during the first quarter of the year. But the exposure doesn’t end with the tax-filing season. Especially since criminals can monetize the same data year-round. “W-2 data is the holy grail because you can’t reset it, like a password,” says Michael Marriott, a research analyst with Digital Shadows, a digital-risk management company. “PII (personally identifiable information) is always going to be attractive—it doesn’t matter […]

  • hacked siren

    Hacked sirens should serve as warning that better infrastructure security is neededData Security

    Share

    It’s tempting to ignore the warning sirens that blared Dallas out of bed last Saturday night, the work of a hacker. But that would be a very serious mistake. We hear so much about the importance of securing America’s critical infrastructure systems. Then you find out that the company responsible for maintaining the Dallas outdoor warning siren network also is an office furniture moving company. In case you missed it, outdoor sirens in Dallas screeched […]

LOAD MORE ARTICLES