About Adam K Levin | Contact | Videos

Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.


VPN

Want to protect your small or midsize business from a breach? Set up a VPN

Share

As prices come down, virtual private networks (VPNs) are becoming a must-have tool for many small-l and medium-size business owners. The growing popularity is a reflection of the chaotic times in enterprise computing, marked by malware and ransomware targeting vulnerable systems and a decentralized work force of globetrotting employees juggling several gadgets at once. More SMB data is now stored in the cloud, too, often leaving company executives at the mercy of the servers they […]

  • Microchipped dog

    Can Your Adopted Pet Expose You to Fraud?Data Security, Identity Theft

    Share

    Pet ownership has definite upsides. You get companionship and exercise and the satisfaction of doing a good deed. Plus, people who own pets live longer. Unfortunately, pet ownership can also make you a target for phishers, scammers and identity thieves. The Vector du Jour With 65% of U.S. households including pets (and an estimated $60 billion in spending on them), pet owners represent persons of interest for scammers. The focus here is on a nearly […]

  • Shield your data

    Keep it safe: How to shield your sensitive data and control accessData Security

    Share

    Recent high-profile photo hacks have made headlines. In March, internet hackers targeted celebrities including Miley Cyrus, Emma Watson and Amanda Seyfried, among others, resulting in the leak of intimate photos that were posted on sites such as 4chan and Reddit. Similarly, back in 2014 hacker Ryan Collins exposed nude photos and videos of several celebrities after obtaining them from iCloud accounts. But celebrities aren’t the only ones vulnerable to hackers. Imagine if your organization’s C-level executives had […]

  • biometric scan

    Why Scanning Your Fingerprint Could Cost You Your PrivacyData Security, Privacy, Technology

    Share

    You can’t change your physical traits very easily, so if a hacker steals your biometric data–look out. Scanning a fingerprint or even an eyeball to authenticate your identity is no longer the stuff of science fiction. Biometric identification has been in practical use for a while now, and the technology gets more sophisticated every day. It should come as no surprise that security and privacy concerns have arisen along the way. And now the legal ramifications are rapidly getting more complicated. […]

  • WannaCry

    White House, businesses hit snooze button after Petya, WannaCry wake-up callsData Security, Technology

    Share

    WannaCry was a wake-up call. Petya is a wake-up call. Last I checked, wake-up calls were meant to bring about change. After WannaCry, we saw a massive surge in patching around the globe, not to mention a 22-year-old “accidental hero” in the U.K. who helped halt the malicious software. It’s proof that beating the drum continuously to public and corporate institutions about serious cyber defense tactics doesn’t seem to do the trick, and once again […]

  • Ransomware

    Why The Ransomware Plague Is Only Warming UpData Security, Cybersecurity

    Share

    Ransomware continues to pose a potent threat to individuals and, increasingly, to companies. What’s worse, all signs point to ransomware attacks escalating the rest of this year and into 2017. How bad is it? Arctic Wolf Networks has measured a 433 percent spike in ransomware attacks over the past year, and the FBI says victims paid up $209 million in the first quarter of 2016, up from $24 million in all of 2015. And that only […]

  • Cyberthieves

    New tools automate cyber criminals’ attempts to take over corporate accountsData Security, Cybersecurity

    Share

    Nearly all of the largest organizations throughout the world had their credentials exposed by cyber criminals last year, a new study has found. The study, done by London- and San Francisco-based Digital Shadows, which provides clients with information about their external digital risks, determined that 97 percent of the world’s largest 1,000 organizations had credentials exposed. The credentials are valuable to cyber criminals who “are increasingly turning to credential stuffing tools,” Digital Shadows officials say, […]

  • VPN

    VPNs prevent marketers, others from cashing in on your browser historyData Security, Privacy

    Share

    Virtual private networks are back in the spotlight. In March, Congress voted to repeal rules that would have required internet service providers to get customer permission to sell their web-browsing data. ISPs are now free to market valuable customer information, triggering concern among privacy advocates. Detailed behavior profiles created by ISPs could be particularly handy tools for marketers targeting those most vulnerable to predatory sales campaigns, including the poor and tech neophytes. “Further overreaching by […]

  • Children's online safety

    Now’s the Time to Talk Online Security With Your ChildrenData Security, Technology

    Share

    Summer’s here and the time is right for getting hacked or worse, having the contents of your computer held hostage by ransomware. For a couple of carefree and extreme data-consuming months, kids everywhere will be doing whatever they want online even if you’ve tried to control them. In other words, be very afraid. Only you know if it is time to have “the talk” with your child about online security. But before you sheepishly clear […]

  • Cybersecurity experts cringe as Trump hands out his cell phone numberData Security, Politics

    Share

    The internet stirred earlier this week about the meaning of the word “Covfefe”—generated, one could guess, when the president fell asleep mid-tweet, phone in hand. But a more important Trump cell phone issue got far less attention. The Associated Press reported that Trump is giving out his cell phone number to world leaders so they can call him directly. Not only is this highly unusual, it creates plenty of security risks—not to mention public records issues. Earlier, […]

LOAD MORE ARTICLES