Archives: March, 2017

Doug Bedell — March 31, 2017, 1:15 pm

What’s Going On With Internet Privacy, Security?

Bruce Schneier provides an explanation for all reports we’ve had lately on Congress altering our Internet privacy. “Think about all of the websites you visit every day,” Schneier writes. “Now imagine if the likes of Time Warner, AT&T, and Verizon collected all of your browsing history and sold it on to the highest bidder. That’s […]

Doug Bedell — March 29, 2017, 11:50 am

Attacked? Your Customers Will Have Concerns – So Apologize

So, what if you what if you get hit by a cyber attack that disables your service to customers for a while and might prompt concerns about their web security? To the rescue comes LT PR in Portland, OR, with “5 Ways to Respond Like a PR Pro During a Data Breach or Cyberattack.” Now […]

Doug Bedell — March 27, 2017, 2:04 pm

Bruce Schneier Rues TSA’s ‘Selective’ Laptop Ban

Bruce Schneier discusses the Transportation Security Administration’s (TSA) newly announced ban on airline passengers from eight Muslim countries carrying aboard “any electronics larger than a smartphone.” “It’s difficult to make sense of this as a security measure,” Schneier feels, “particularly at a time when many people question the veracity of government orders, but other explanations […]

Doug Bedell — March 24, 2017, 2:59 pm

‘Phishing’ Being Fought Via Two-Factor Entry Systems

Here’s a computer security word to know: phishing. Google defines it as “the fradulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.” Enterprises are adding “two factor” systems – a one-time code in addition to a password […]

Doug Bedell — March 22, 2017, 1:14 pm

Healthcare Information, Too, Is a Computer Security Risk

Now, evidently, it’s in healthcare, too – complacency over computer security. Brand Barney reports on the Security Metrics blog that “When it comes to the security aspect of HIPAA (a 1996 act on medical data privacy), many healthcare organizations are complacent, thinking a data breach won’t happen. As a result, far too many organizations are […]

Doug Bedell — March 20, 2017, 3:23 pm

‘Spear Phishing’ Explained; It’s Digitally Treacherous

Barrier Briefs has been noting the vulnerability of computer users to spammers and hackers. Here’s a specific instance discussed by Brian Krebs on his security blog of a company – Defense Point Security – that had to advise is employees “that their W-2 tax data was handed directly to fraudsters after someone inside the company […]

Doug Bedell — March 17, 2017, 4:26 pm

‘White-Hat Hacking’: It’s Come to That – To Insure Web Safety

With cybersecurity at heightened levels of awareness, we’ve reached a point at which we can note the emerging discipline of “ethical hacking.” Ethical hacking? Well, now you can pay to determine if you’re being intruded upon on the Web. Paul Ridgewell on Naked Security reports on “white hat” contractors, “a somewhat shady-sounding occupation that uses […]

Doug Bedell — March 15, 2017, 10:29 am

Getting a Grip on Digital Security

Bruce Schneier led us to the Digital Security Exchange, a new organization launched in the context of the growing concerns over the vulnerability to intrusion of digital systems. “So much infrastructure is vulnerable:,” writes Josh Levy, “Vast databases of constituent information sit in the cloud, state surveillance is eradicating privacy and chilling free speech, and […]

Doug Bedell — March 13, 2017, 3:25 pm

The Risk of Cyber Security Attacks: Oh Gee, It’s Growing

In case you haven’t been giving them center stage, the risks of a cyber attack on your security system(s) are growing, the Security blog advises, so pay heed. “But there isn’t just one (such risk). Instead, it’s a combination of issues that will create a complex, multi-faceted problem set that has no clear-cut solution. “To […]

Doug Bedell — March 10, 2017, 11:59 am

Banking on Security? Not So Fast…

Ericka Chickowski on Dark Reading reports on a study advising that while banks have “some of the most advanced application security practices and tools” in place, they’re not so hot at validating them or requiring their third-party vendors “to have similar policies and standards.” In other words, cyber security can sometimes be only keyboard deep. […]