About Adam K Levin | Contact | Videos

Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.


  • Privacy and security

    Data Security: Can Corporations Protect Us From Hackers?Column, Data Security, Blog

    Share

    Gregg Steinhafel’s ouster at Target this week was a major C-Suite casualty in corporate America’s war on hackers. Sales took a major nosedive after the retailer’s big data security breach hit the news last December, with fourth-quarter profits down 46%. So what’s a CEO to do? First of all, if it seems a little overblown to blame Target’s poor performance of late solely on the breach, I’d tend to agree with you. There was the […]

  • Data Breaches: Why Assigning Blame Is a Zero-Sum GameColumn, Data Security, Blog, Personal Finance

    Share

    Today’s data breaches are like a game of musical chairs: sooner or later, you’ll have to face the music. Last year was bad for data security: More than 800 million records containing sensitive consumer data were exposed. News of breaches keeps rolling in. Identity theft—which had been considered a crass scare tactic conjured up by creative marketing departments to sell solutions to a non-problem – has become the third certainty in life, alongside death and […]

  • AOL: Hacked or Spoofed, It’s Time to Check Your Sent FolderData Security, Blog

    Share

    The latest security alert online seems to be the work of a Walking Dead fan. Twitter is lighting up with users complaining that long-closed AOL accounts recently came back to life, with phishing emails spreading like a zombie epidemic. #AOLHacked is trending on Twitter as people are letting their followers know about the phishing emails, and venting their frustration. Hacked. Sorry. I didn't do it. #AOL #AOLHacked — Konii Thomas (@KoniiThomas) April 22, 2014 At […]

  • Why You Are Vulnerable To Tax Identity TheftColumn, Data Security, Blog

    Share

    A few weeks ago, a friend of mine – let’s call her Mallory – got an unsettling call from her accountant. The accountant had been preparing Mallory’s taxes, hit “Send” to e-file the finished return, and it was rejected. Someone had already filed a tax return using Mallory’s Social Security number. She’d been a victim of tax identity theft. The accountant called the IRS, but they wouldn’t talk to her. Mallory called and was directed […]

  • The Data Breach Factor So Many Companies Forget: EmotionColumn, Data Security, Blog

    Share

    Smart business people know that they must secure their systems to withstand the most determined and persistent real-world, as well as cyber, attacks. They must minimize their risk of exposure by deploying the most sophisticated security and anti-malware software, using outside firms to frequently penetration-test their cyber defenses, continuously training their employees to comply with the most stringent security protocols, investigating every vendor and installing state-of-the-art physical security equipment. They must obsessively monitor all of […]

  • Stanford’s $4 Million Data Breach Settlement Proves You Are Your VendorData Security, Blog

    Share

    My alma mater, Stanford University, is awaiting final judicial approval of a $4 million settlement in a class action suit over its 2011 data breach. Each of the 20,000 class members — whose confidential medical records were left up online for almost a year — will receive $100 and Stanford Hospital & Clinics will fund a $500,000 educational program to help prevent similar breaches in the future. The question, however, is who the program will […]

  • Could BYOD Leave Your Small Business DOA?Column, Data Security, Blog

    Share

    There is a line of thinking among many of my small-business colleagues that allowing employees to supply their own computers and phones – known as Bring Your Own Device, or BYOD – is both convenient and a great way to save money. Whenever I hear that from anyone, the first thing I ask is if they require these employees to take the appropriate steps to secure these personal machines. If their answer is, “huh?” I […]

  • Medical history

    100 Percent Increase in Criminal Attacks on Healthcare EntitiesData Security, Blog

    Share

    The Ponemon Institute released a report today that includes some alarming news: Criminal attacks on healthcare organizations increased by an eye-popping 100 percent since 2010. With a continued ad-hoc approach to security at many organizations and millions of patients signing up for healthcare made possible by the Affordable Care Act, cybercriminals have been presented with an irresistible opportunity for potential crimes. 91 organizations were included in the study—11 more than last time around. The take-away: […]

  • 5 Ways to Keep Your Passport SafeColumn, Data Security, Blog

    Share

    If you’ve had to go get a new passport lately, you have learned (like me) it’s no longer the easiest thing to prove that you’re you. If you’re a first-timer, you must show up in person with a birth certificate, at least one government-issued ID (two if it’s out of state), photocopies, forms and fees, and then wait your turn. If you lose your passport while traveling abroad, you’ve got to show up at an […]

  • Ever Wonder What an ATM Skimming Device Looks Like?Data Security, Blog

    Share

    You probably know that criminals have long figured out how to trick people into handing over their credit card information. One way is the skimmer. If you thought you’d never fall for that trick, think again. Turns out, skimmers can look a lot like the reader that unlocks doors that lead to bank machines. And because it is very difficult to tell the difference and thieves mount cameras over the machines to capture your PIN, […]

LOAD MORE ARTICLES