Close

Articles Posted in Cybersecurity

Updated:

Don’t Rock the Vote: Helping State and Local Governments Fend Off Cyber Attacks

Voting in local, state and national elections could be viewed as a rudimentary form of social media, by which voters share their views and preferences via selection of a candidate or party platform. The distance between this “old school” social media and its multi-headed modern form has shrunk thanks to…

Updated:

“Life Is Short. Settle with the FTC” – The Cost of Ashley Madison’s 2015 Data Breach

On December 14, 2016, operators of online extramarital dating and social networking website AshleyMadison.com came to an agreement with the Federal Trade Commission, and several States, to settle FTC and related state charges that the website deceived consumers and failed to protect 36 million users’ account and profile information. As…

Updated:

FriendFinder Data Breach Exposes 400 million+ Accounts

FriendFinder Networks is a company in the adult entertainment, social networking, and online dating space. Several databases from FriendFinder Networks web sites with more than 412 million accounts, including usernames, e-mails, and passwords, have been breached and leaked. November reports of this data breach on The Verge, LeakedSource and TechCrunch,…

Updated:

The FTC Offers Businesses Tips on How to Respond to a Data Breach

It seems like managing data breaches has become a part of doing business these days. From the October denial of service attack on Dyn (a company that provides core internet services to companies like Twitter, Spotify and Netflix) to the recent hacks of the Clinton campaign’s emails, data breaches are…

Updated:

Location Disservices? Protecting against the Inherent Cybersecurity Risks of Geotagging

In this political season, much has been made about late-night Twitter rants targeting women and other social media attacks on individuals and celebrities. Although these harsh online critiques create a more hostile cyber community, more imminent danger may arise from the safety risks that accompany online activity in general. Law-enforcement…

Updated:

Are Your Social Media Fans Cybersecurity Savvy?

Today’s online world is all about engaging and staying connected with others via social media. For businesses, establishing a presence on various social media platforms is an enticing way to connect with current customers as well as foster new business. Yet the immense popularity of social media sites can also…

Updated:

How Older Cybersecurity Lapses Can Give Birth to Future Data Breaches

Since my last post on the subject (“LinkedIn Grapples with the Ripples of a 2012 Data Breach”), there have been several developments related to LinkedIn’s 2012 data breach. First, in May, LinkedIn announced it has finished the process of invalidating passwords at risk, specifically LinkedIn accounts that had not reset…

Updated:

Are There Phishing Holes in Your Cybersecurity Insurance?

A robust cybersecurity strategy involves sophisticated, overlapping protections. Along with up-to-date technology, well-trained employees and vigilant IT professionals, comprehensive insurance coverage is an often necessary ingredient of any protective “moat” shielding a company from damaging cyberattacks. Yet does a company’s cyber insurance package actually protect it from one of the…

Updated:

LinkedIn Grapples with the Ripples of a 2012 Data Breach

Last week on the official LinkedIn blog, the company’s chief information security officer, Cory Scott, reported the company had become aware of an additional set of data that has just been released consisting of e-mail and hashed password combinations of more than 100 million LinkedIn members. This recent release is…

Updated:

Ashley Madison Update: Hacked Data Is Off-Limits

On April 29, 2016, Judge Ross issued his ruling on Ashley Madison’s motion for a protective order, prohibiting Plaintiffs from using the leaked documents, reports quoting the leaked documents, and information “stolen from Avid” in drafting their consolidated class action complaint. The result was largely policy driven, with Judge Ross…