About Adam K Levin | Contact | Videos

Column


  • How to Keep Your Smart Devices From Exposing Your DataColumn, Data Security, Blog

    Share

    In 2015, somewhere in the neighborhood of 1 billion Internet of Things (IoT) devices will be purchased, an increase of 60% over the previous year. There will be 10 billion IoT devices connected to the Internet this year. A couple of years ago, a survey found that three out of four Americans had no clue that there was such an animal as the Internet of Things, and many likely still don’t know (until you tell […]

  • Worried About Hackers? Surf the Web with Your MomColumn, Blog

    Share

    An old Chinese proverb says: “There is only one beautiful child in the world, and every mother has it.” But there are times when people test that mother-child connection, turning their “matron” saints into judge, jury and even warden. Increasingly, various stripes of online scoundrel can act as a catalyst for the above transformation. As we all know, despite that spiel about unconditional love, there is no end of things a son or daughter can […]

  • Identity Theft: A Real-World Version of ‘The Walking Dead’Column, Blog

    Share

    In the post-apocalyptic world of “The Walking Dead,” it’s a foregone conclusion that zombies happen, and they aren’t picky. One real-world parallel of finding yourself surrounded by hungry zombies is the plague of identity theft. With more than 1 billion records “out there,” it’s just a matter of time before you get got. When it comes to identity theft, people have many questions and few answers. Should I shred sensitive documents? (Yes.) Is it worse […]

  • The CIA Director Got Hacked Because of Data Breach FatigueColumn, Blog

    Share

    “He’s supposed to be so high in the government. Head of CIA. He should be more clever.” Those are the words of an alleged hacker from a self-styled “operation” called CWA—Crackas With Attitudes—in conversation with CNNMoney’s Laurie Segall. The alleged hackers accessed sensitive information stashed in the private email accounts of Homeland Security Secretary Jeh Johnson and CIA Director John Brennan. As it stands now, the FBI and the Secret Service are looking into claims […]

  • Physician Heal Thyself: Are Your Medical Records Safe?Column, Blog

    Share

    According to an article in Tech Times, healthcare providers in the U.S. may lose $305 billion in the next five years due to cyberattacks. One way those attacks keep happening: BYOD, or bring your device to work. One definition of insanity, according to Einstein (and my chief content officer Michael Schreiber), is to do the same thing, over and over, expecting a different result. Well, when it comes to cybersecurity, the precautions one can take […]

  • The Defense Question We Should Continue Debating: CybersecurityColumn, Blog

    Share

    It doesn’t matter if they are state-sponsored or live in their parents’ basement. Hackers thrive in the shadows of our culture. Leaders hesitate to declare supremacy over them lest they get taught a very public lesson in humility. But, if a superpower uses those hackers to access a foreign government’s information, and that’s not an act of war, what next? Jim Webb, a heavily decorated war veteran, tried to get his fellow presidential hopefuls to […]

  • Does Your Airline Really Understand Data Security?Column, Blog

    Share

    A friendly reminder to organizations in regular communication with the public: You never know who John Q. Public is; for example, it could be me—Adam K. Levin. (Not to be confused with the singer of the almost same name—Adam Levine.) But there are a bunch of Adam Levins, which is why my middle name (Kenneth) and initial (K) actually matter. Here’s the short version of my recent saga with American Airlines. The name on my […]

  • How to Master Your Credit Score without a Trial By FireColumn, Blog, Personal Finance

    Share

    I was visiting a house of worship last Sunday – no, I didn’t have to wear a name tag – and while listening to Pastor Ryan (who coincidentally is also a lawyer) talk about the ways in which one can gain wisdom, the life lesson he discussed has applications far beyond the realm of morality or matters more spiritual. In particular, I was struck by a three-part prescription at the center of his sermon that […]

  • How to Keep Scammers From Pulling an Identity Theft Double WhammyColumn, Blog

    Share

    When it comes to data security and the real-life impact of identity theft, public awareness is at an all-time high. But there is still great confusion and ignorance about what it is, how it happens, and what can be done to avoid the pitfalls of life after a data breach or personal compromise. Most of us still feel flummoxed—and perhaps a bit panicked—when we get a phone call, an email or a letter saying our […]

  • 16 Ways You May Be Exposing Yourself to FraudColumn, Blog

    Share

    Stand in front of a mirror. There’s the enemy. Fraud doesn’t happen to you in a vacuum. Our personally identifying information (PII) doesn’t just get magically swiped. We “swipe” our information all the time, and it’s time to stop. The world runs on information, and no amount wishful thinking will fully extricate you from that. But there are some best practices. As I detail in my forthcoming book, Swiped, we all need to take responsibility […]

LOAD MORE ARTICLES