Building a Security Culture

pexels-security

In addition to demonstrating quick wins so that your CEO will take data security seriously, you should also be planning for the long term by building strong security awareness within your organization. When the FTC held a webcast on “Building a Security Culture,” I was very curious to hear what tips they had to share. […]

Continue Reading →

Lessons from the Malware Museum

italian-building-italy-destroyed

If you haven’t already seen Mikko Hypponen’s collection of vintage malware at the Internet Archive, take the time for a brief tour. If you’re on a lunch hour, it’s also worthwhile to hear Mikko’s talk on how malware has evolved from its primitive roots.

Continue Reading →

Today I Learned: There are some things you REALLY don’t want in bulk

healthy-person-woman-sport

Everybody knows that you can have too much of a good thing: high impact yoga, deep water yodeling, reading TIL posts while unicycling, or any hobby where you’re required to “shuck” things. But what if you take an ordinary bad thing and raise it to the power of awful! In other words, you ratchet up […]

Continue Reading →

New Updates to the CIS Critical Security Controls

If you haven’t already heard, the Top 20 Critical Security Controls has a new name. Last year, after the Center for Internet Security(CIS) integrated with the Council on Cybersecurity, the controls are now referred to as the (CIS) Critical Security Controls. In addition to a new name, these controls have also been reordered to address current […]

Continue Reading →

Lawyers, Files, and Money

black-and-white-city-man-people

After two days of being around attorneys, judges, and legal technologists, I saw a few legal truths very close up. I had always heard from my lawyer friends about billable hours, but it’s clear from LegalTech that it’s almost the prime directive for law firms. So if you tell a partner why she should encrypt […]

Continue Reading →

Bring your Geek to Court

geek to work

It’s LegalTech week. That’s the annual gathering in NYC where attorneys, corporate counsels, and IT people meet to discuss ediscovery, predictive coding, and whether it’s safe to delete a file. My first morning session was a keynote panel discussion that featured five federal judges. It was fascinating to hear these legal eagles discuss a wide […]

Continue Reading →

Identity Theft Complaint? Tell the FTC!

money-finance-bills-bank-notes

Hackers steal information about you, and unfortunately it’s often months later that the company realizes there’s been a breach. But in the meantime, identity thieves use your PII to open new credit card accounts, file false tax returns, or commit medical insurance fraud, as well as make fraudulent charges on existing credit card accounts. Like […]

Continue Reading →

7ev3n Demands a Whopping 13 Bitcoins to Decrypt Your Data

pexels-photo-large

7ev3n is a new ransomware that encrypts your data and demands 13 bitcoins – or approximately $5,000USD – to decrypt your files. It’s the largest ransom we’ve seen to date for ransomware. 7ev3n not only encrypts your files, it also modifies your computer’s system settings so that your keyboard and system recovery options are disabled. […]

Continue Reading →

Celebrating Privacy Day [INFOGRAPHIC]

celebrate-privacy-day

Data Privacy Day is an “effort held annually on Jan. 28 to create awareness about the importance of privacy and protecting personal information.” That’s a concept we approve of! Of, course, there are many ways to create privacy awareness. You could, for example, go over to your IT department to ask why data and privacy […]

Continue Reading →

Poll: Users Cause IT the Most Pain

man-couple-people-woman

We know you’re all curious about the results of our IT Pain Point poll from December. The numbers are in, and we now can say the top three sources of extreme distress for IT people. The answers are: users (24%), tech hype (18%) and, in a tie for third place, management and money (7%). You […]

Continue Reading →