No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns
No Password Required: A Security Engineer and Budding Surfer Who Took PentesterLab From Side Hustle to Global Success
No Password Required: A Developer Advocate with Auth0 and an "Accordion Guy" with Rockstar Aspirations
No Password Required: Former Commander, United States Central Command, Executive Director of Cyber Florida and an Appreciator of Battlefield Beef Enchiladas
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Hybrid Workforces and Compliance with Sheila Limmroth
[Podcast] Prioritizing Cybersecurity in a Hybrid Workplace
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
Digital Planning Podcast - Interview With Leeza Garber
Happy Password Day
Zoom Security Best Practices
Data Privacy Legislation, Part 2 (and bonus tips on teleworking from two law mamas who feel your pain!)
Compliance Perspectives: Cybervigilance and Cyber-resiliency
Life With GDPR: Episode 26- The Importance of Passwords
Employment Law This Week: Password Sharing, Organizing Mixed Units, Mental Health Accommodations, Privacy Shield
Employer Social Media Policies – Interview with Mitch Danzig, Member, Member, Mintz Levin
As More States Implement Social Media Password Laws, There’s Still Some Blind Spots
How to Protect Your Company From Hackers
The Basics of Michigan’s Social Media Password Law & Why It Isn’t Such a Great Idea
Today’s mobile workforce means that many employees blend their personal and professional lives on the same devices, possibly putting organizations’ data at risk. During the holiday season, in the search for gifts, low prices,...more
We’ve spoken before of the need to make your website passwords some combination of complex, long, unusual, nonsensical, personally memorable, etc. For those of us who comply with those suggestions, but have an inflated...more
According to Roger Grimes at KnowBe4 (a leading security awareness training company), the average person has to login to 170+ websites, but has only 3 to 19 different passwords. One hundred and seventy may sound like a very...more
Cybersecurity Awareness Month may have ended on October 31, but cyber criminals are active 365 days a year, and they’re online looking for vulnerabilities around the clock. Every day, we also spend time online: navigating the...more
Data scraping is a technique by which automated tools are used to extract data from a website and format the data for analysis. Many companies mine website users’ publicly accessible data in order to tailor products and...more
I am not a big fan of putting all of one’s passwords in one place, but many people use password managers. If you use Last Pass (see previous blog posts about Last Pass here and here), be aware that it was recently advised by...more
The 2019 calendar year had a rough beginning with several massive data breaches. Now, just this week, over 600 million account details were stolen from 16 different...more
Thinking about cyber security education for young children, elderly parents and grandparents might not be necessarily be on the top of your priority list. But, it is important given the substantial increase in malware and...more
Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more
Depending on the calculation method, what you are may be worth as little as $5. Who you are, however, can be worth much more. Experian recently sent an email linking out to an interesting article on the amount your...more
News about phishing attacks implemented through email and websites is very common (see Déjà vu All Over Again; American Express – New Bait for an Old Phishing Lure; Beware of Text Scam, iPhone Users; Beware New Hacker Scheme...more
The Social Security Administration recently announced that beginning June 10, two-factor authentication will be required for all account holders logging into the “My Social Security” portal. To comply with this new rule,...more
In a pair of highly anticipated decisions, the Ninth Circuit significantly reshaped criminal and civil liability under the federal Computer Fraud and Abuse Act (CFAA). The court’s recent decisions in United States v. Nosal...more
In what has been described as a response to the arrests of protesters on a climate march in Paris this past Sunday in the midst of the United Nations Framework Convention on Climate Change (UNFCC), the hactivist organization...more
Delaware recently enacted four privacy laws–the Online and Personal Privacy Protection Act (DOPPA), the Student Data Privacy Protection Act (SDPPA) the Victim Online Privacy Act (VOPA) and the Employee/Applicant Protection...more
Last month one of our lead articles was Cyber Security: Forewarned is Fair-Warned. Last week the New York Times published an article reporting that at least 1.2 billion usernames and passwords were hacked by a Russian...more
Michigan’s Internet Privacy Protection Act (IPPA) prohibits employers from gaining access to applicant and employee personal Internet accounts. When the IPPA became effective on December 28, 2012, Michigan joined Maryland,...more