Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.

Children and data
By now almost everyone I know (and millions of people I haven’t had the pleasure of meeting yet) has read or heard about Sony’s announcement last week that its PlayStation network was hacked and that the Personal identifying Information (PII) of potentially 77 million individuals worldwide has been compromised. Then, earlier this week, Sony notified us that there’d been...
A massive cyber attack on American infrastructure is the 21st-century equivalent of the neutron bomb. All buildings remain standing but systems inside them are rendered useless. Human beings aren't killed on a large scale, but few, if any, are left standing either. And while this sounds pretty dire, it's quite likely some segment of this nation will at some...
The recent revelations regarding the outrageous escapades of certain News Corp. subsidiaries, and the employees thereof, have been so scandalous as to capture and dominate the attention of the worldwide media for several weeks. For once, most Americans began to follow business news with the obsessive fascination normally accorded “Jersey Shore” and “Keeping Up with the Kardashians.” This story has...
A few days ago, a friend of mine received several letters dated June 24, 2011 from Morgan Stanley Smith Barney, where he has kept brokerage accounts for himself and his children for many years. It began with the now familiar, “we care about you” phrase: “At Morgan Stanley Smith Barney, client satisfaction and information security are critical priorities.” Then it segues...
Last week I expressed my concern over efforts in Congress to delay, defang and ultimately defund the Consumer Financial Protection Bureau. I called upon consumers to rebel against being treated as little more than pachyderm toe-jam and to send a clear message in 2012 to those in Congress who have been the spear carriers for business. My consternation over the...
There was a time, when the World Wide Web was young, that many entrepreneurs counted on the idea they could make money the old-fashioned way–by charging cyber-customers on a per-use basis, the same way they charged traditional brick-and-mortar patrons. Most print magazines, for example, felt they could make a seamless transition from paid print subscriptions to paid Internet subscriptions....
Well, two fascinating—and repellant—things happened in the last few days, which but for the broadest possible subject matter connection, would seem to be unrelated. On May 6, a group calling itself LulzSec hacked Fox Entertainment network computers and released personal information about people from the database of potential contestants for the popular Fox show “X Factor.” Five days later,...

Bin Phishin’?

Phishing
Last week, the President and Commander in Chief announced something many Americans had been anticipating (though less and less, as time passed) for nearly a decade. Osama bin Laden, the person responsible for the single largest murder of Americans in history had been found and summarily executed in a stunningly efficient covert operation carried out by the Navy Seals. Not...
The World Wide Web seems to be making the world less wide. Everyone is connected to everyone and everything else, and that is changing the way many things are done, particularly advertising and marketing. The past decade or so has seen a radical evolution in the way marketers define and reach their target markets. Gone are the days when...
In the 21st century, the data breach apology letter has established itself as a new literary art form. Countless CEOs from corporations big and small as well as elected officials have had to reach out to the public and offer mea culpas that both communicate how sorry they are that this serious breach happened, and ultimately that there is...