Passwords

News & Analysis as of

Let’s be “Friends” – Should I “Friend” My Employees? And Other Questions Raised by the Internet Privacy Protection Act

On the last day of the 2016 Regular Session, the West Virginia Legislature passed a bill that will require all West Virginia employers to evaluate their social media policies and practices. HB 4364, known as the Internet...more

It’s Back for Spring 2016: The Annual Verizon Data Breach Investigations Report

Last year around this time we examined the results of Verizon’s annual Data Breach Investigations Report (DBIR). As in year’s past, Verizon analyzed the data it received from companies across the country about security...more

SSO – Single Sign On

Due to recent high profile data breaches users have a heightened awareness of security and how they manage or don’t manage their various account credentials. People are beginning to pay more attention to the advice given to...more

LinkedIn Grapples with the Ripples of a 2012 Data Breach

Last week on the official LinkedIn blog, the company’s chief information security officer, Cory Scott, reported the company had become aware of an additional set of data that has just been released consisting of e-mail and...more

Safe or Good? We All Have Choices to Make

I planned to write about the inspired, better-than-sliced-bread security option of using fingerprint authentication to protect our mobile devices. That imploded. In 2014, and earlier this year, courts in Virginia and...more

LinkedIn admits that 2012 data breach in fact affected 117 million users’ data

A LinkedIn data breach in 2012 supposedly exposed 6.5 million LinkedIn users’ hashed passwords. LinkedIn announced yesterday (May 18, 2016) that in fact, it impacted more than 177 million user accounts, and that the...more

Trusts and Estates Group News: Estate Planning Enters the Digital Age

One reality of modern life is our increasing reliance on digital information and services. It’s difficult to take and then order prints of photographs, accumulate travel rewards, book travel, sort through financial records,...more

The Proof Is in the Password!

Consider this scenario: A young couple entrusts you, an experienced real estate attorney, to assist them in the purchase of their first home. Days before closing, your unsecured email account gets hacked and your client...more

Estate Planning, Wills and Trusts: Importance of Considering the Internet and “Digital Assets” in Estate Planning

“Forgot your ID or password?” Everyone using the Internet has probably been asked and answered “Yes” to this question. That usually means having to take the time to answer more questions or search for...more

Stolen user credentials account for over half of all data breaches in 2015

Verizon recently released its yearly Data Breach Investigations Report and as always, the report is a very informative read. The report gathered information from more than 64,000 security incidents worldwide in 2015, 2,260 of...more

Privacy Tip #30 – Protect yourself and your co-workers: please don’t sell your company credentials

I am on a lot of privacy and security list-serves and keep up with surveys relating to data privacy and security. I was most distressed this week to download SailPoint’s 2016 Market Pulse Survey. Not that it isn’t well...more

Keying into your digital assets: Revise your estate plan to account for online documents

In the not-so-distant past, one likely kept copies of vital estate planning documents locked in a fire-resistant vault or file cabinet, with copies at an attorney’s office. However, in this digital age, it’s more likely that...more

Top 10 Ways to Protect Your Company’s Data

You know how important data is to your business and you have been hearing about data breaches for more than a decade, but where do you find a simple, straightforward summary of how to protect your company? That is a question...more

Challenging the Conventional Wisdom on Mandatory Password Changes

Very interesting thought piece from the FTC’s Chief Technologist. Do mandatory password resets actually make us less secure? ...more

Check Your Password and Touch ID If You’re Divorcing

Generally speaking, when you’re involved in marital conflict (divorce, separation, etc.), you should immediately change the password to your email, work computer, tablet and of course your phone. We also discussed this in...more

MFA – Multi-Factor Authentication

Every morning we sit down at our computers and provide our credentials to the network; user name and password. It has become such a ubiquitous part of modern life, we have a user name and password to everything, we even have...more

Weak Baby Monitor Security Subject of FTC Internet of Things Study

On January 19, the Federal Trade Commission posted the results of a small study of baby monitor security, finding that four out of five devices tested did not have basic security procedures in place. The FTC warned that such...more

Oklahoma and Virginia become newest states to consider social media legislation

The list of states that have passed social media legislation is getting longer. Early next week, Oklahoma will become the newest state to consider social media legislation (along with approximately 23 others) to prohibit...more

FTC warns, connected baby monitors are more susceptible to hackers

At the PrivacyCon event held by the Federal Trade Commission (FTC) last week in Washington, D.C., the FTC warned that several brands of baby monitors lack basic security features like complex passwords and data encryption,...more

Password authentications should become more obsolete

The username/password method of authentication is dying, albeit slower than many of us would like. In 2016, we should see a continued trend of replacing password authentication as the primary method for navigating through...more

Privacy Tip #15 – Protecting your privacy during holiday travel

The holiday season means traveling to see family and friends, and is a wonderful time of year. That travel includes planes, trains and automobiles. Although that movie was hilarious, travel can be hazardous to the protection...more

Public-private team of security experts disrupt Dorkbot malware

This is how it should be—private companies working with law enforcement to disrupt evil doers on the Internet. Late last week, Microsoft announced that it teamed up with the Department of Homeland Security, Europol, the FBI,...more

Anonymous hacks login information of Paris climate summit attendees

In what has been described as a response to the arrests of protesters on a climate march in Paris this past Sunday in the midst of the United Nations Framework Convention on Climate Change (UNFCC), the hactivist organization...more

Game of Phones: Employer-Issued Smartphones and Employee Fifth Amendment Protections

A recent court decision holding that employees can claim the Fifth Amendment and refuse to unlock password-protected smartphones, even though the phones were issued by their employer for company business, demonstrates the...more

Highlights from the FTC’s Second “Start With Security” Initiative

On November 5, the FTC hosted its second “Start With Security” event in Austin, Texas in an effort to provide companies with practical tips and strategies for implementing effective data security....more

265 Results
|
View per page
Page: of 11
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×