About Adam K Levin | Contact | Videos
Recent Tweets

LATEST ARTICLES

  • Vet your vendors

    Want to Avoid a Data Breach? Start By Taking a Close Look at Your Vendors

    Data Security 

    It has been almost four years since the massive Target data breach. Astoundingly, managing third-party risks still does not command the vigilance it should in all too many organizations. The latest proof: ten states neglected to vet America’s Joblink Alliance, the contractor behind the Joblink nationwide data base for job seekers. So by cracking into Joblink, an attacker gained access to Social Security Numbers and birth dates for citizens in Alabama, Arizona, Arkansas, Delaware, Idaho, Illinois, Kansas, Maine, Oklahoma, and […]

  • VPN

    Want to protect your small or midsize business from a breach? Set up a VPN

    Data Security Technology 

    As prices come down, virtual private networks (VPNs) are becoming a must-have tool for many small-l and medium-size business owners. The growing popularity is a reflection of the chaotic times in enterprise computing, marked by malware and ransomware targeting vulnerable systems and a decentralized work force of globetrotting employees juggling several gadgets at once. More SMB data is now stored in the cloud, too, often leaving company executives at the mercy of the servers they […]

  • IoT

    As use of IoT devices explodes, detecting vulnerabilities becomes nascent industry

    Cybersecurity 

    The number of machine-to-machine connected devices—the Internet of Things—is growing faster than the world population. Cisco estimates that M2M connections will grow from 4.9 billion in 2015 to 12.8 billion by 2020 (estimated world population in 2020: 7.7 billion). Growth in IoT security expenditures is as robust. Gartner puts endpoint IoT security spending at $1,183 billion in 2015, and estimates $3,010 billion in 2020. “Everybody’s realizing that IoT security is a serious problem,” says Xu Zou, CEO […]

  • Microchipped dog

    Can Your Adopted Pet Expose You to Fraud?

    Data Security Identity Theft 

    Pet ownership has definite upsides. You get companionship and exercise and the satisfaction of doing a good deed. Plus, people who own pets live longer. Unfortunately, pet ownership can also make you a target for phishers, scammers and identity thieves. The Vector du Jour With 65% of U.S. households including pets (and an estimated $60 billion in spending on them), pet owners represent persons of interest for scammers. The focus here is on a nearly […]

  • Shield your data

    Keep it safe: How to shield your sensitive data and control access

    Data Security 

    Recent high-profile photo hacks have made headlines. In March, internet hackers targeted celebrities including Miley Cyrus, Emma Watson and Amanda Seyfried, among others, resulting in the leak of intimate photos that were posted on sites such as 4chan and Reddit. Similarly, back in 2014 hacker Ryan Collins exposed nude photos and videos of several celebrities after obtaining them from iCloud accounts. But celebrities aren’t the only ones vulnerable to hackers. Imagine if your organization’s C-level executives had […]

  • biometric scan

    Why Scanning Your Fingerprint Could Cost You Your Privacy

    Data Security Privacy Technology 

    You can’t change your physical traits very easily, so if a hacker steals your biometric data–look out. Scanning a fingerprint or even an eyeball to authenticate your identity is no longer the stuff of science fiction. Biometric identification has been in practical use for a while now, and the technology gets more sophisticated every day. It should come as no surprise that security and privacy concerns have arisen along the way. And now the legal ramifications are rapidly getting more complicated. […]

  • Grandparent scam

    The Common Scams People Still Fall for All the Time

    Consumer Protection 

    The top site for classified ads in the U.K. conducted a study recently that should send a wave or two to this side of the Atlantic. When it comes to scams, it’s all about the bait. Gumtree found that even with the forethought that a listing was a scam, more than a third of their users would still go ahead with a transaction. As my mother would say … Actually, she’d probably just shake her […]

  • WannaCry

    White House, businesses hit snooze button after Petya, WannaCry wake-up calls

    Data Security Technology 

    WannaCry was a wake-up call. Petya is a wake-up call. Last I checked, wake-up calls were meant to bring about change. After WannaCry, we saw a massive surge in patching around the globe, not to mention a 22-year-old “accidental hero” in the U.K. who helped halt the malicious software. It’s proof that beating the drum continuously to public and corporate institutions about serious cyber defense tactics doesn’t seem to do the trick, and once again […]

  • Airbnb scam

    How to Avoid the Latest Airbnb Scam

    Consumer Protection Technology 

    A friend of mine showed up last night at a place we sometimes meet. He looked like Red Sox pitcher Chris Sale after lobbing a game-ending home run to Aaron Judge of the Yankees. He was supposed to have been on a plane to Italy. I asked him what happened. “We were all set to head out,” he said. “First leg: Rome. But I just canceled our tickets, like, a second ago.” I asked why. “Airbnb […]

  • Ransomware

    Why The Ransomware Plague Is Only Warming Up

    Data Security Cybersecurity 

    Ransomware continues to pose a potent threat to individuals and, increasingly, to companies. What’s worse, all signs point to ransomware attacks escalating the rest of this year and into 2017. How bad is it? Arctic Wolf Networks has measured a 433 percent spike in ransomware attacks over the past year, and the FBI says victims paid up $209 million in the first quarter of 2016, up from $24 million in all of 2015. And that only […]

LOAD MORE ARTICLES