About Adam K Levin | Contact | Videos
Recent Tweets

LATEST ARTICLES

  • Health records

    Health care IT departments must defend against cyber attacks — and also the NSA

    Data Security health care 

    Every successful cyber attack provides a learning opportunity for technologists. WannaCry provides two: Big organizations, particularly in health care, must learn to prioritize safety over compliance; and while doing that, they shouldn’t have to fight against American-made weaponry. For a long time, many health care providers have been worried about the wrong thing in cybersecurity—compliance rather than patient safety. With the WannaCry attack, we see the most frightening example yet of the devastating consequences. Last […]

  • Privacy and surveillance

    The Bulls-eye in Your Pocket: Geo-Fencing

    Privacy Technology 

    First Amendment concerns and consumer privacy law has people talking about a case recently settled in Massachusetts. It revolved around the practice of serving advertisements with geo-fencing technology. At issue: was it legal for anti-abortion groups to use this new marketing technique to directly communicate with young women on their way to get abortions? According to the settlement in Massachusetts, the answer, at least for the time being, is no. The ads in question used […]

  • Cyber defense

    Are You Hack-Proof? Here’s How to Make Sure

    Swiped Cybersecurity Technology 

    While the writing has been on the wall for a long time, last Friday it was in the news wires when a new strain of ransomware called WannaCrypt raged like an out-of-control wildfire across Europe and Asia, ultimately impacting computers in 150 countries. For many affected by this hack, a few hundred dollars in ransom money is a pittance when compared to the cost of hiring someone to attempt the recovery of your files after […]

  • cyberattack

    50 Ways to Avoid (or Deal With) a Cyberattack

    Data Security Technology 

    In case you missed it, a major cyberattack swept the globe Friday. Per pretty much every major news outlet here in the U.S., hackers locked computer systems worldwide, then threatened to destroy data if the victim did not pay to be let back in. In other words, they executed a large scale ransomware attack, targeting companies, government agencies, public institutions and ordinary citizens across continents. The attack comes just one week after Google Docs users […]

  • Ransomware

    Why WannaCry portends coming surge in attacks launched via self-spreading worms

    Data Security Technology 

    The landmark WannaCry ransomware attack, I believe, may have been a proof of concept experiment that inadvertently spun out of control after it got released prematurely. But now that it’s out there, WannaCry signifies two developments of profound consequence to company decision-makers monitoring the cybersecurity threat landscape: • It revives the self-propagating internet worm as a preferred way to rapidly spread new exploits, machine to machine, with no user action required. • It lights up […]

  • Mother's Day

    4 Mother’s Day Scams You Want to Avoid

    Consumer Protection Catphishing 

    Did you know that with the exception of Christmas, people spend more money on Mother’s Day than any other holiday? The forecast for 2017 is $23.6 billion, and if you think scammers aren’t on the job, there’s a new marshmallow bridge spanning Loon Lake I’d to sell you a piece of. In order, the most-gifted recipients of Mother’s Day sentimental swag are mothers and stepmothers, then wives, daughters, sisters or stepsisters, grandmothers, godmothers, and, for […]

  • bank vault

    Why a Hacker May Be Lurking Near Your Bank Account

    Cybersecurity 

    Don’t expect the financial services industry to ever willingly disclose how much it loses to cyber thieves on an annual basis. But make no mistake determined, well-funded hacking rings continue to breach banking systems on a regular basis. And they continue to inflict material losses–likely at a scale the general public would find shocking. Breach attempts against financial services firms occurs 24/7/365, says Brian Soldato, senior product management director at NSS Labs, an Austin, Tex.-based […]

  • laptop ban

    Laptop Ban is a Cyber Hygiene Wake-up Call

    Data Security 

    Earlier this year, the U.S. Department of Homeland Security (DHS) instituted an electronics ban on flights in and out of the United States. As per DHS’s Fact Sheet “Electronic devices larger than a cell phone/smart phone will not be allowed to be carried onboard the aircraft in carry-on luggage or other accessible property. Electronic devices that exceed this size limit must be secured in checked luggage.” Between this, the Galaxy Note 7 restriction (fire on a plane […]

  • Identity portfolio

    5 Tricks to Make Your Identity Portfolio More Secure

    Data Security Identity Theft 

    I’ve written extensively about the importance of building a credit portfolio. Credit equals buying power, which, when used wisely, can lead to increased net worth. Put simply, bad credit means fewer consumer choices and a staggering number of lost opportunities in the way of deals, car-factory incentives and other credit-based transactions. No matter the purchase type, the lowest interest rates and the biggest loans go to those with the strongest credit portfolios. You can read […]

  • ransomware

    Ransomware plot line: Netflix hackers follow script that leads to money

    Cybersecurity Identity Theft 

    TV show leak is good reminder for everyone to put their digital lives in order The premature release of the new season of “Orange is the New Black” by hackers is no big deal. Really. You can see why producers made the calculation that stopping the “hack” was not even worth the alleged $66,000 or so the hackers demanded as “ransom,” according to TorrentFreak. Why? Online show fans are very familiar with the restraint required […]

LOAD MORE ARTICLES