In this 2-part series we will break down the physical damage that multiple redundant data entries can have on your workforce, and ways to mitigate these risks for a more accurate and resilient data foundation and human workforce. Repetition often manifests through ‘band-aid’ style fixes, leaving the data owners to sacrifice any combination of the
So, You’ve got Cyber Insurance and You’re all Set, Right?
How about we play a little cyber insurance trivia to find out? Trust me; it’s more interesting than you might think. In an interview between Carole Theriault and Martin Overton, Theriault plays, “Covered by cyber Insurance, True or False” with Overton, who once worked for a large cyber insurance company. Overton describes himself as a
“Next Gen” Devices Aren’t Going to Solve Your Current Security Problems
Are you sick of the marketing hype suggesting some “Next Gen” security device can solve all your security problems? Yes? Good. If not, maybe you should be. Let’s pick on the Redmond giant for a moment to illustrate an example. Microsoft announced last month that after a legal victory, it had taken down 99 websites
Regulatory Fines, The Dollars are in the Details
I was just speaking with a colleague about the news that Google has been fined the largest penalty to date for failing to comply with GDPR obligations. The penalty was around $56 million USD, but the Marriott data breach penalty is estimated to be around $1 billion. Why such a discrepancy between the two? That
Data Privacy is not an Illusion, but the Solution might be
We have all been exposed, if not inundated, with the fact that so much of our personal information has been systematically harvested for years. Both with and without our knowledge or consent. Combine this with a never-ending stream of data breaches that have left vast amounts of our personal lives scattered about the dark web
Navigating an Unchartered Territory of Cybersecurity.
It was by pure chance that I attended a security symposium at Harvard’s School of Engineering and Applied Sciences (SEAS) several years ago. I don’t know exactly what attracted me to this particular meeting of crypto minds, but it was a very fateful day in my knowledge and understanding of Cybersecurity. Among many of the
Can you see the real me – can you?
Usernames and passwords are being stolen by ‘bad actors’ every day. Via human engineering exploits, the ‘bad actor’ lures legitimate users into unwittingly surrendering their usernames and passwords. One of the more popular exploits is the well-crafted e-mail messages that warns of service interruption for the recipient’s e-mail service – just click the link and
Dark Web? We don’t need no stinking Dark Web…
Wait what? Need the Dark Web? What are you talking about? The truth is so much information about you is already available in all the places where it’s supposed to be secure. Imagine for a second that your personal information only existed in the Dark Web. Ironically, it might really be less accessible – well
Along the Fault Line: CA takes on Data Privacy Rights & Silicon Valley Freaks
What’s to worry about California taking on Data Privacy Rights legislation that aims to protect the individual’s data and punish businesses that make their cash by peddling it? Well, it seems that if you Google “California GDPR”, ironically you might find results indicating that Google is none-too-happy, for one. Yes, that’s right, California has passed,
Cybersecurity Starts at the Top
A majority of an organization’s information is now stored and transferred in digital form creating an extremely urgent need for them to secure their data. The integrity of this digital information is constantly being challenged by attacks aimed at stealing, exposing or manipulating it. This hostile environment affects all industries, from healthcare to finance