Posts Tagged ' privacy'

We are pleased to present below all posts tagged with ' privacy'. If you still can't find what you are looking for, try using the search box.

Cybersecurity: It’s A Game and They Are Winning

It is similar to a Chess Game, but different: Each day, the small business owner is busy focusing on running his shop. He has customers to please, suppliers to deal with, product to promote and daily issues to address. He has little time each day to consider of all the ramifications of making sure that all his data is protected. He knows that it is important, but with all his responsibilities, he cannot give this aspect of his business, the attention it deserves. The hacker, sits in front of the computer, focused on the task of stealing your data. That is his day, his purpose, his job and he is very good at it.  He knows that the small business owner has many things to concentrate on. He understands “small business vulnerability” and he uses it to his advantage. He also knows that big business has teams dedicated to making sure that their data is secure and firewalls are strong, so he chooses to target the mom and pop shops. One player is focused on the game, the other di ...

Popular tags: , , , , , , , , , , , , , ,

Finally, businesses are listening to this great advice

An article came across my desk last week, that immediately caught my attention. A recent story in CFO online magazine has given me the news I had been hoping for. Finally, I am seeing the results of everything I have been working for, recommending, advocating and advising my clients, for the last 10-years…. Love this statistic: “A September survey by the Risk and Insurance Management Society found that 80% of the companies recently surveyed, purchased a stand-alone cyber-security policy in 2016.” The takeaway: Policies covering exclusively cyber exposures are becoming the new normal for many large companies. Yahoo! Mail, is one of the largest and latest data hacks that has grab headlines since Sept 22nd. More than 500 million users saw their passwords, phone numbers and other information accessed in an ongoing data breach. This continuous cavalcade of data breaches, ransom-ware, cyber extortions, theft of trade secrets and theft of intellectual property, has affected major corporation ...

Popular tags: , , , , , , , , , ,

Cyber Criminals - More than Just the Geek in the Basement

Usually in movies they are portrayed as a maniacal recluse. Sitting in front of multiple computer screens, with AC/DC blasting and crumpled cups of coffee and Red Bull scattered all over the desk and the floor. Or as a “V for Vendetta”, Guy Fawkes-styled freedom fighters with a score to settle. Cyber Criminals, Hackers, Data Thieves are the designations we have given them. And they come in all shapes, sizes and forms, from all walks of life, male/female, rich and poor. Their motivation is as varied as their backgrounds. Some choose to become hackers because they seek revenge on someone who betrayed them. This category includes employees of businesses; citizens angry against the government; lovers who feel they have been wronged. Other cyber criminals are looking for monetary gain, often holding data “hostage”. Businesses need to pay a “ransom’ to receive a “key” to be able to unlock and access their data. Since the inception of mainframes and shared/networke ...

Popular tags: , , , , , , , , , , , , , ,

#Cyber-Aware- If you had a 70% chance of a car accident, you would purchase auto insurance. If you own a small business, you have a 70% chance of a Cyber-Breach

Saturday was the conclusion of Cyber Awareness Month. To give you a bit of background, President Obama designated October as National Cyber Security Awareness Month, “to engage and educate public and private sector partners through events and initiatives with the goal of raising awareness about cyber-security and increasing the resiliency of the nation in the event of a cyber incident.” The Department of Homeland Security, whose purpose is to secure the nation from threats, is the designated "lead agency" concerning all civilian computer systems and infrastructure. The department's focus is defensive, (providing and dispersing information to prevent data from becoming compromised) and responsive, (distributing threat warnings, reacting to data breaches). The DHS's mission is simply to make you aware of the threat, work to minimize it, and handle the repercussions when a data breach occurs.  And although the DHS and other government and private sector interests are doing a wonderful job o ...

Popular tags: , , , , , , , , , , , , ,

National Cyber Security Awareness Month … Why Insurance is the only TRUE protection in the war of Cyber-Security …

October is National Cyber-Security Awareness Month. Not many people are knowledgeable of this fact, as October is filled with many causes and national observances. But the purpose of designated months is to break through the clutter and serve as a quick reminder. Although we have made great strides in the last two years to make business owners aware of the issues, some are still at, what I refer to as, the “disregard” stage when the topic of “Cyber-Security” is raised.  For many, Cyber-Security is simply a headline on the nightly news, a sound bite, a bit of conversation that passes through. It doesn’t seem real. They consider it something that happens to other companies, other businesses that are not vigilant. Ironically even businesses that are aware, take precautions, know the risks and attempt to secure their information, can often find themselves vulnerable. I was curious to read stories of small business owners and their thoughts on Cyber-Security and I was n ...

Popular tags: , , , , , , , , , , , , , , ,

The Internet of Things – Cyber criminals are now exploiting the vulnerabilities of automobiles, commercial airliners and even heart monitors.

When consumers and business think of cyber-security, hacking and breaches, the first thing that generally comes to mind is credit card accounts, bank accounts and health data; any personal information that is stored on large mainframes in extensive databases. But did you know that your automobiles, smart thermostats, bio-chips, heart monitoring implants and other small devices in your everyday life, also have the capability of being hacked? Devices that collect useful data are known as “The Internet of Things”. IoT is a network of physical objects embedded with electronics, software, sensors and connectivity to enable objects to collect and exchange data. These devices collect useful data with the help of various existing technologies and then autonomously flow the data between other devices. Experts predicted that the amount of IOT devices in the marketplace will be 50 billion objects by 2020. On September 10th, the F.B.I issued a Public Service Announcement warning to businesses and cons ...

Popular tags: , , , , , , , , , , , , ,

There is at least one individual out there, that is trying to steal your identity ...

Do you remember a time when you could simply tear up a piece of paper and toss it in the trash? You could carry your Social Security card in your wallet? It’s amazing how much the world has changed in the last 20 years, that a person can “Google” your name and zero in on the exact location of your home, complete with Street View images. Your identity is no longer safe. At this moment, there is at least one individual looking to steal your identification and use all of your personal information for their own private use. And almost always, by the time you realize that something is askew … the damage is done. It can take years and thousands of dollars to rectify.  Because it is vitally important to protect all aspects of your identity, below is a list of tips on how to keep it safe:  1. Use a paper shredder. Carefully watch what you throw out. Shred any papers or statements that contain personal facts about you, including your date of birth and any of the following numbe ...

Popular tags: , , , , , , , , , ,