About Adam K Levin | Contact | Videos
Recent Tweets

LATEST ARTICLES

  • Children's online safety

    Now’s the Time to Talk Online Security With Your Children

    Data Security Technology 

    The time is right for getting hacked or worse, having the contents of your computer held hostage by ransomware. For a couple of carefree and extreme data-consuming months, kids everywhere will be doing whatever they want online even if you’ve tried to control them. In other words, be very afraid. Only you know if it is time to have “the talk” with your child about online security. But before you sheepishly clear your throat in […]

  • Cybersecurity experts cringe as Trump hands out his cell phone number

    Data Security Politics 

    The internet stirred earlier this week about the meaning of the word “Covfefe”—generated, one could guess, when the president fell asleep mid-tweet, phone in hand. But a more important Trump cell phone issue got far less attention. The Associated Press reported that Trump is giving out his cell phone number to world leaders so they can call him directly. Not only is this highly unusual, it creates plenty of security risks—not to mention public records issues. Earlier, […]

  • superhero

    How the Superhero Approach Can Help You Avoid Identity Theft

    Identity Theft 

    A recent Experian study found that most people still have a lot to learn about the risk of identity theft. The majority of those surveyed felt like they were safe from identity theft, but not for the right reasons. The most popular misconception was that scammers, phishers and identity thieves only target the rich and possibly famous. In reality, identity thieves target low-hanging fruit. To an identity thief, we’re all Kim Kardashian. More than half […]

  • WannaCry

    Five best practices worth repeating in wake of WannaCry attack

    Data Security 

    In the world of cybersecurity—particularly for small- and midsize businesses—progress tends to be achieved in fits and starts. Rare is the SMB that has the patience and focus to take a methodical approach to improving network security over an extended period. So when news of the WannaCry outbreak grabbed the mainstream media’s attention recently, fear among SMBs spiked and attention turned to cyber issues. However, just as quickly, it seems, the pendulum appears to be […]

  • Summertime Scams

    6 Summer Scams & How to Avoid Them

    Data Security Consumer Protection 

    As the weather gets warmer, mosquitos and ticks re-enter our lives, and along with them comes their larger cousin, the scam artist. There are ways to prepare for those seasonal meal stealers. The same goes for scams, as foreknowledge is the best repellent. Ticks and mosquitos aren’t harmless — they are well-known vectors for serious illnesses. Scam artists are also vectors for a plague that affects millions of people each year: identity theft. But sometimes […]

  • Health records

    Health care IT departments must defend against cyber attacks — and also the NSA

    Data Security health care 

    Every successful cyber attack provides a learning opportunity for technologists. WannaCry provides two: Big organizations, particularly in health care, must learn to prioritize safety over compliance; and while doing that, they shouldn’t have to fight against American-made weaponry. For a long time, many health care providers have been worried about the wrong thing in cybersecurity—compliance rather than patient safety. With the WannaCry attack, we see the most frightening example yet of the devastating consequences. Last […]

  • Privacy and surveillance

    The Bulls-eye in Your Pocket: Geo-Fencing

    Privacy Technology 

    First Amendment concerns and consumer privacy law has people talking about a case recently settled in Massachusetts. It revolved around the practice of serving advertisements with geo-fencing technology. At issue: was it legal for anti-abortion groups to use this new marketing technique to directly communicate with young women on their way to get abortions? According to the settlement in Massachusetts, the answer, at least for the time being, is no. The ads in question used […]

  • Cyber defense

    Are You Hack-Proof? Here’s How to Make Sure

    Swiped Cybersecurity Technology 

    While the writing has been on the wall for a long time, last Friday it was in the news wires when a new strain of ransomware called WannaCrypt raged like an out-of-control wildfire across Europe and Asia, ultimately impacting computers in 150 countries. For many affected by this hack, a few hundred dollars in ransom money is a pittance when compared to the cost of hiring someone to attempt the recovery of your files after […]

  • cyberattack

    50 Ways to Avoid (or Deal With) a Cyberattack

    Data Security Technology 

    In case you missed it, a major cyberattack swept the globe Friday. Per pretty much every major news outlet here in the U.S., hackers locked computer systems worldwide, then threatened to destroy data if the victim did not pay to be let back in. In other words, they executed a large scale ransomware attack, targeting companies, government agencies, public institutions and ordinary citizens across continents. The attack comes just one week after Google Docs users […]

  • Ransomware

    Why WannaCry portends coming surge in attacks launched via self-spreading worms

    Data Security Technology 

    The landmark WannaCry ransomware attack, I believe, may have been a proof of concept experiment that inadvertently spun out of control after it got released prematurely. But now that it’s out there, WannaCry signifies two developments of profound consequence to company decision-makers monitoring the cybersecurity threat landscape: • It revives the self-propagating internet worm as a preferred way to rapidly spread new exploits, machine to machine, with no user action required. • It lights up […]

LOAD MORE ARTICLES