• Jan 19
    2018
    At the end of 2016, the predictions that would dictate 2017 in terms of security came out. From ransomware and political disruption to the advancement of cybercriminals and social media attacks, most of these predictions became reality. However, no one could have imagined the extent of these issues, especially in terms of ransomware and the cases of WannaCry and NotPetya. What should we be prepared for this year? Here are ...
  • Jan 08
    2018
    From fidget spinners and unicorn Frappuccinos to virtual reality, 2017 was a year that can be described by unique trends. Unfortunately, we must also add a disturbing amount of large cyberattacks to the trend list. Hackers managed to cause an unprecedented level of chaos at a global-level with state-sponsored ransomware, major phishing campaigns, and enormous hacks. Here are a few of the most devastating and scandalous hacks from last year: ...
  • Dec 21
    2017
    It’s a scary time in the world of cybersecurity. With sophisticated cyber threats being carried out against the government and rival nations attacking, the time has come for the entirety of the security world to work together to protect ourselves. This means not only communicating more openly, but also better preparing and changing the culture surrounding data breaches in its entirety. While there are many areas in which businesses need ...
  • Dec 13
    2017
    As we begin the New Year, the cyber war that has been raging continues to grow in size and scale. In 2017, we have unfortunately seen many enormous data breaches, including Equifax, Kmart, and Verizon, and the overall average size of a data breach increased by two percent. 2018 is without a doubt going to bring new challenges, threats, and trends to the world of cybersecurity. So, what kind of ...
  • Sep 06
    2017
    The 2017 Cost of Data Breach Study: Global Analysis, which is available here (registration required), examined the impact of 20 different factors on the cost of a data breach. I wanted to take this opportunity to discuss the top five of those factors. Presence of an incident response team (13% reduction in cost). I have noted before that the factor with the greatest impact on the average cost of a ...
  • Jun 06
    2017
    The other day, I did a web search on the string “wannacry wake up call” and got “about 1,180,000 results.” The conventional wisdom, then, is that the Wannacry attack is a danger signal to which we need to pay attention. This is a case in which the conventional wisdom is right on target. Let me offer a quick review of the disaster, based on its entry at Wikipedia. The attack ...
  • May 19
    2017
    Pundits and commentators are concerned that automation is eliminating jobs, and some say it is happening at an unprecedented rate. An article in the New York Times last December captured the widespread worry. Its title: “The Long-Term Jobs Killer Is Not China. It’s Automation.” You only have to look around to see what kinds of jobs are being lost to automation. Taxi drivers are being replaced by ride sharing services. ...
  • Apr 04
    2017
    There are millions of mobile apps available now through the Apple App Store, Google Play, and Windows Phone Store. But the major commercial app outlets are only part of the story. Increasingly, organizations are harnessing employee connectivity by creating their own proprietary mobile apps. Organizations find that developing a mobile app is a lot like developing a traditional desktop app, in that best practices include start with security in mind, ...