If you don't think cybersecurity is a selling point these days, you're probably not doing as well as you could be--no matter what it is you do in digital. Larry Ellison is dialed into this new home truth, and may well be poised to overtake ...Read More
Don’t be surprised if the Cambridge Analytica/Facebook story turns out to be merely the first in a long line of stories to come about the abuse of consumer data purloined from social media.
ZDnet reports that 48 million personal profiles were compromised with data that was just as granular as the information in the possession of Cambridge Analytica–if not more...Read More
It doesn’t matter how many times you tell employees not to share passwords. A new study suggests many people are still going to do it.
The 2018 Privileged Access Threat Report, recently published by Bomgar, a leader in identity and access management solutions for privileged users. The study is global, taking a look at employees, independent contractors, and third-party vendors, specifically at the way they handle security.
Brass tack: 50% of the organizations contacted for the...Read More
The most remarkable aspect of the revelation Facebook allowed millions of people to unwittingly, and unwillingly, help the Trump victory machine on social media may be that people are actually surprised by it.
The social networking giant knew for two years that a third party had ill-gotten, harvested data associated with more than 50 million U.S. voters—almost all of it without their knowledge or consent.
The story came by way of a ...Read More
You can spot a Nigerian email scam without opening it. You know what you’re doing when it comes to keeping ID thieves from conning you. And if someone tried to get the kind of personal information needed to open credit in your name, well, it just wouldn’t happen.
Except it would.
Credit gets stolen using personal information all the time. In the wake of the Equifax breach it’s happening even more than usual.
The Identity Theft Resource Center tracks data breaches every...Read More
Unless you live in a pineapple under the sea with a talking sponge, you’re probably familiar with the never-ending parade of cute animal pictures sent by text and email—friend to friend, email list to subscriber—and everywhere you look on social media. Hackers are counting on that.
You’re no fool. You keep current on the news—specifically with regard to cyber security. You’ve seen the...Read More