About Adam K Levin | Contact | Videos

Data Security

The latest on data breaches and cybersecurity and data security by Adam K Levin.


  • toxic work environment

    How to Protect Your Data Without Creating a Toxic EnvironmentData Security, Technology

    Share

    There’s nothing quite like a company-wide directive to spread a sense of malaise at the office, especially when it’s about data security–worse yet if it comes in the wake of a data compromise. It is critical to approach the issue in a productive, non-threatening way. All the good intentions in the world can’t keep “information security” from instilling insecurity in the hearts of most employees. Call it “infosec,” as your company’s go-to insiders may be […]

  • Cybersecurity jobs

    Unfilled jobs are the biggest threat to cybersecurityData Security, Cybersecurity, Technology

    Share

    Automation, a deeper talent pool and more women can help close infosec gap When asked, “what is the biggest threat to internet security?” the majority of quick-fire answers can likely be represented by the flags of a handful of nation states. Yet examining the nature of the industry, it can easily be argued that the biggest risk internet security faces is the general inability to respond to and counter attacks launched by adversaries. Today, it […]

  • Boardroom cybersecurity

    TalkTalk takeaway: Cybersecurity is a boardroom issueData Security, Technology

    Share

    Enterprises, SMBs must gird for new rules and protect sensitive data – or pay hefty price British telecom giant TalkTalk actually may have gotten off lightly when privacy regulators hit the British telecom giant with a £400,000 ($496,910) fine last week for failing to prevent a major data breach. The fine, issued by the U.K.’s Information Commissioner’s Office is, indeed, for a record amount. And it will clearly hurt TalkTalk, both financially and in reputation. […]

  • Data Breach

    Without better security, massive Yahoo hack could be the new normData Security, Technology

    Share

    Stronger authentication, less dependence on passwords needed to thwart wide-scale data breaches It’s not the big one, but it’s close. Yahoo confirmed long-suspected reports that a hacker had accessed millions of customer passwords. The number, however, is a bit shocking even to a reporter who’s been writing this same story for the past 10 years. Five hundred million. For many years, I’ve prepared myself to report on a very, very large-scale data compromise that would […]

  • phishing

    Afraid of Catfishing? A New Tool Is Trying to Make the Internet SaferData Security, Identity Theft

    Share

    Anyone who’s read oddly positive online reviews or happened on Twitter users with suspiciously large followings knows that the Internet is full of fakes. Bogus followers or fake reviews aren’t just annoying — they call into question the very notion of crowdsourcing, one of the Internet’s most valuable tools. Researchers at Carnegie Mellon University are hard at work developing automated tools to separate fake from real, attempting to restore the credibility of the wisdom of […]

  • Scam Alert

    Watch Out for This Scam if You Follow Banks on InstagramData Security, Banking

    Share

    There are lots of good reasons to follow companies on social media — to gain insight into the brand’s priorities, learn about deals, seek inspiration, get behind-the-scenes looks, berate them for bad customer service, and so on. But who you follow on social media isn’t always private, and there are people out there who will use who you follow to try and steal your money. A new report from ZeroFOX, a security technology company, suggests […]

  • kids hacked

    5 Ways Your Kids Can Get You HackedColumn, Data Security, Personal Finance

    Share

    For adults, home is a refuge, but for children it is a never-ending treasure hunt. While you’re out — you know, paying for the place — it’s a safe bet your kids are getting into your stuff, and when it comes to things digital, that can be a serious problem. As a seasoned parent, you’ve had that shock a thousand times, looking up from your phone, tablet or computer to the sight of a child […]

  • ransomware

    Tips to avoid becoming a victim of ransomwareData Security, Technology

    Share

    Ransomware is becoming one of the most profitable areas of cyber crime. In the past, cyber criminals would steal data, and then re-sell it. With ransomware, they block access to an individual or organization’s data by encrypting it, then selling the data’s owner a decryption key to regain access. And with the rise of hard-to-trace currency, such as bitcoin, there is less chance of getting caught. Organizations will pay for fear that they’ll lose their […]

  • cyber-security

    5 Cyber-Security Myths We Need to DitchData Security, Technology

    Share

    Pick a subject, any subject, and there are myths and pure nonsense that someone will buy into. Birds will die if they eat the uncooked rice flung at newlyweds. (Nope) If you eat Mentos and drink Diet Coke simultaneously your stomach will explode. (Hardly) You only have one credit score. (Wrong) Napoleon was short. (At 5’ 6”, his height was average in his day). “President Obama was the founder of ISIS.” (Oh, come on Donald!) […]

  • The talk

    Gone Phishing? How to Talk to Your Kids About MalwareData Security, Technology

    Share

    Picture this: The car is full. You’re navigating by the side mirrors while doing a mental inventory of everything you packed and wondering if you are going to make it to the realtor’s office in time to pick up the keys for your vacation rental. You have absolutely no idea what the kids are doing in the back seat. Now forget the massive distraction of that summer road trip and consider the bigger picture. It […]

LOAD MORE ARTICLES