Close

Articles Posted in Cybersecurity

Updated:

The Doxing Dilemma: A Popular Tactic of Social Activists and Cyber Bullies Alike Remains Mostly Legal

After counter-protests ended in tragedy, a small group of social media users took to Twitter to expose the identities of the white supremacists and neo-Nazis rallying in Charlottesville, Va. Since last Sunday, the @YesYoureRacist account has been calling on Twitter users to identify participants in the rally. Twitter users identified…

Updated:

Executive Order 13800 – Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

President Donald J. Trump signed Executive Order 13800 titled “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure” on May 11, 2017, his thirty-fifth executive order since taking office. Before evaluating President Trump’s cybersecurity executive order, it is worth taking a step back to look at what Candidate Trump said…

Updated:

Don’t Rock the Vote: Helping State and Local Governments Fend Off Cyber Attacks

Voting in local, state and national elections could be viewed as a rudimentary form of social media, by which voters share their views and preferences via selection of a candidate or party platform. The distance between this “old school” social media and its multi-headed modern form has shrunk thanks to…

Updated:

“Life Is Short. Settle with the FTC” – The Cost of Ashley Madison’s 2015 Data Breach

On December 14, 2016, operators of online extramarital dating and social networking website AshleyMadison.com came to an agreement with the Federal Trade Commission, and several States, to settle FTC and related state charges that the website deceived consumers and failed to protect 36 million users’ account and profile information. As…

Updated:

FriendFinder Data Breach Exposes 400 million+ Accounts

FriendFinder Networks is a company in the adult entertainment, social networking, and online dating space. Several databases from FriendFinder Networks web sites with more than 412 million accounts, including usernames, e-mails, and passwords, have been breached and leaked. November reports of this data breach on The Verge, LeakedSource and TechCrunch,…

Updated:

The FTC Offers Businesses Tips on How to Respond to a Data Breach

It seems like managing data breaches has become a part of doing business these days. From the October denial of service attack on Dyn (a company that provides core internet services to companies like Twitter, Spotify and Netflix) to the recent hacks of the Clinton campaign’s emails, data breaches are…

Updated:

Location Disservices? Protecting against the Inherent Cybersecurity Risks of Geotagging

In this political season, much has been made about late-night Twitter rants targeting women and other social media attacks on individuals and celebrities. Although these harsh online critiques create a more hostile cyber community, more imminent danger may arise from the safety risks that accompany online activity in general. Law-enforcement…

Updated:

Are Your Social Media Fans Cybersecurity Savvy?

Today’s online world is all about engaging and staying connected with others via social media. For businesses, establishing a presence on various social media platforms is an enticing way to connect with current customers as well as foster new business. Yet the immense popularity of social media sites can also…

Updated:

How Older Cybersecurity Lapses Can Give Birth to Future Data Breaches

Since my last post on the subject (“LinkedIn Grapples with the Ripples of a 2012 Data Breach”), there have been several developments related to LinkedIn’s 2012 data breach. First, in May, LinkedIn announced it has finished the process of invalidating passwords at risk, specifically LinkedIn accounts that had not reset…

Updated:

Are There Phishing Holes in Your Cybersecurity Insurance?

A robust cybersecurity strategy involves sophisticated, overlapping protections. Along with up-to-date technology, well-trained employees and vigilant IT professionals, comprehensive insurance coverage is an often necessary ingredient of any protective “moat” shielding a company from damaging cyberattacks. Yet does a company’s cyber insurance package actually protect it from one of the…