About Adam K Levin | Contact | Videos

Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.


Summertime Scams

6 Summer Scams & How to Avoid Them

Share

As the weather gets warmer, mosquitos and ticks re-enter our lives, and along with them comes their larger cousin, the scam artist. There are ways to prepare for those seasonal meal stealers. The same goes for scams, as foreknowledge is the best repellent. Ticks and mosquitos aren’t harmless — they are well-known vectors for serious illnesses. Scam artists are also vectors for a plague that affects millions of people each year: identity theft. But sometimes […]

  • Health records

    Health care IT departments must defend against cyber attacks — and also the NSAData Security, health care

    Share

    Every successful cyber attack provides a learning opportunity for technologists. WannaCry provides two: Big organizations, particularly in health care, must learn to prioritize safety over compliance; and while doing that, they shouldn’t have to fight against American-made weaponry. For a long time, many health care providers have been worried about the wrong thing in cybersecurity—compliance rather than patient safety. With the WannaCry attack, we see the most frightening example yet of the devastating consequences. Last […]

  • cyberattack

    50 Ways to Avoid (or Deal With) a CyberattackData Security, Technology

    Share

    In case you missed it, a major cyberattack swept the globe Friday. Per pretty much every major news outlet here in the U.S., hackers locked computer systems worldwide, then threatened to destroy data if the victim did not pay to be let back in. In other words, they executed a large scale ransomware attack, targeting companies, government agencies, public institutions and ordinary citizens across continents. The attack comes just one week after Google Docs users […]

  • Ransomware

    Why WannaCry portends coming surge in attacks launched via self-spreading wormsData Security, Technology

    Share

    The landmark WannaCry ransomware attack, I believe, may have been a proof of concept experiment that inadvertently spun out of control after it got released prematurely. But now that it’s out there, WannaCry signifies two developments of profound consequence to company decision-makers monitoring the cybersecurity threat landscape: • It revives the self-propagating internet worm as a preferred way to rapidly spread new exploits, machine to machine, with no user action required. • It lights up […]

  • laptop ban

    Laptop Ban is a Cyber Hygiene Wake-up CallData Security

    Share

    Earlier this year, the U.S. Department of Homeland Security (DHS) instituted an electronics ban on flights in and out of the United States. As per DHS’s Fact Sheet “Electronic devices larger than a cell phone/smart phone will not be allowed to be carried onboard the aircraft in carry-on luggage or other accessible property. Electronic devices that exceed this size limit must be secured in checked luggage.” Between this, the Galaxy Note 7 restriction (fire on a plane […]

  • Identity portfolio

    5 Tricks to Make Your Identity Portfolio More SecureData Security, Identity Theft

    Share

    I’ve written extensively about the importance of building a credit portfolio. Credit equals buying power, which, when used wisely, can lead to increased net worth. Put simply, bad credit means fewer consumer choices and a staggering number of lost opportunities in the way of deals, car-factory incentives and other credit-based transactions. No matter the purchase type, the lowest interest rates and the biggest loans go to those with the strongest credit portfolios. You can read […]

  • bad employee

    How Your Worst Employee Could Literally Put You Out of BusinessData Security, Technology

    Share

    Doubtless, you are aware that phishing (an email that looks like a company communication or something work-related containing malware) and spear phishing (the same thing from the spoofed account of a company executive) have become facts of life. Or maybe not. There are a host of reasons to be concerned. Phishing attacks are literally out of control. According to one survey published earlier this year, 85 percent of companies in the United States reported being […]

  • biometric scanner

    Is It Time to Buy a Biometric Scanner?Data Security, Identity Theft

    Share

    Identity theft is still out there, keeping pace with the latest innovations and security measures, and snaring new victims every day. With the advent of cheaper, standalone, easy-to-integrate biometric technology for authentication, is it time to buy a fingerprint scanner? What’s a Biometric Scanner? Biometric technology uses physical or biological information, like a fingerprint, retinal scan or heartbeat, to authenticate a person’s identity. You can currently purchase the most commonplace biometric scanner — that is, […]

  • nigerian scam

    Why You Need to Know About This Nigerian Hacker Ring Targeting Small BusinessesData Security, Technology

    Share

    Nigerian 419 con artists have been around seemingly forever, relentlessly sucking funds out of the bank accounts of one duped individual victim at a time. You’ve probably heard of them. These gambits revolve around tricking the victim into thinking he or she can help transfer a large sum into a U.S. bank, and make a tidy profit on the side. But now some veteran Nigerian criminals have evolved–ripping off small- and medium-sized businesses on a […]

  • How Criminals Are Probing the Internet to Illicitly Control CompaniesData Security, Technology

    Share

    When a young Finnish programmer named Tatu Ylönen conjured up the Secure Shell (SSH) coding protocol in 1995, he had no inkling of the pivotal role his creation would play in the rapid evolution of network-centric commerce. And Ylönen certainly never imagined that one day he would be consumed with spreading awareness about a darker aspect of SSH: his protocol – or, more precisely, how SSH has come to be used as part of the […]

LOAD MORE ARTICLES