FBI Warns of Retaliatory Cyber-Attack from Iran -
The Federal Bureau of Investigation (FBI) is warning of a heightened likelihood of Iranian cyber-attacks following the escalation of tension between the U.S. and Iran. This...more
1/17/2020
/ Assassinations ,
California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Management ,
Data Privacy ,
Data Protection ,
Data Security ,
Dating Services ,
Drones ,
Federal Aviation Administration (FAA) ,
GAO ,
Hackers ,
Information Management ,
Iran ,
Mobile Apps ,
Online Reviews ,
Personal Data ,
Personally Identifiable Information ,
Research Reports ,
Risk Management ,
State Attorneys General ,
Unmanned Aircraft Systems ,
Vulnerability Assessments ,
Yelp
The Federal Bureau of Investigation (FBI) is warning of a heightened likelihood of Iranian cyber-attacks following the escalation of tension between the U.S. and Iran. This follows the warning last week by the Department of...more
1/17/2020
/ Assassinations ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
FBI ,
Hackers ,
Information Management ,
Infrastructure ,
Iran ,
Phishing Scams ,
Popular ,
Retaliation ,
Risk Management ,
Risk Mitigation ,
Terrorist Threats ,
Vulnerability Assessments
Department of Homeland Security Warns of Cyber-Attacks by Iran -
The Department of Homeland Security (DHS) issued a grave warning to U.S. businesses and critical infrastructure operators on January 6, 2020, alerting the...more
1/10/2020
/ Assassinations ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Drones ,
Federal Aviation Administration (FAA) ,
Financial Services Industry ,
Foreign Relations ,
Hackers ,
Information Sharing ,
Iran ,
Microsoft ,
NYDFS ,
Operating System Developers ,
Personally Identifiable Information ,
Risk Management ,
Risk Mitigation ,
Unmanned Aircraft Systems ,
Vulnerability Assessments
Pretty much the only time I don’t feel like I am Chicken Little predicting a massive cyber-attack is when I am with my colleagues at the FBI, Secret Service, NSA and my students in the Brown Executive Masters of Cybersecurity...more
1/10/2020
/ Assassinations ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Department of Homeland Security (DHS) ,
Foreign Relations ,
Hackers ,
Information Technology ,
Iran ,
Malware ,
NYDFS ,
Risk Management ,
Risk Mitigation ,
Vulnerability Assessments
Following the escalation of tensions between the United States and Iran in the past week, the Health Information Sharing and Analysis Center (H-ISAC) is warning hospitals and health systems that Iran could attack health...more
1/10/2020
/ Assassinations ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Hackers ,
Health Care Providers ,
Healthcare Facilities ,
Hospitals ,
Infrastructure ,
Iran ,
Municipalities ,
Phishing Scams ,
Risk Management ,
Risk Mitigation ,
Social Media ,
Terrorist Threats ,
Vulnerability Assessments
The Department of Homeland Security (DHS) is warning critical infrastructure operators to be on high alert for Iranian backed cyber-attacks because of the vulnerability of state and municipal computer systems, they are at...more
1/10/2020
/ Assassinations ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Hackers ,
Iran ,
Municipalities ,
Risk Management ,
Risk Mitigation ,
Terrorist Threats ,
Vulnerability Assessments
The Department of Homeland Security (DHS) issued a grave warning to U.S. businesses and critical infrastructure operators on January 6, 2020 alerting the public that Iran poses a cyber terrorism threat to the United States...more
1/9/2020
/ Assassinations ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Hackers ,
Iran ,
Popular ,
Risk Management ,
Risk Mitigation ,
Terrorist Threats ,
Vulnerability Assessments
Three million fraud cases were reported to the FTC in 2018, and 444,602 of them involved identity theft. These reported cases (just think of how high the statistic would be if all cases were reported) amounts to the third...more
12/19/2019
/ Credit Cards ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Debit and Credit Card Transactions ,
Federal Trade Commission (FTC) ,
Financial Services Industry ,
Hackers ,
Identity Theft ,
Information Security ,
Personally Identifiable Information ,
Risk Management ,
Vulnerability Assessments
Holiday shopping is in full gear and everything seems to be an Internet of Things (IoT) device. It continues to amaze me how folks will buy IoT gadgets and plop them in their homes and have no idea that they include a speaker...more
12/12/2019
/ Biometric Information ,
Children's Products ,
Children's Toys ,
Connected Items ,
Data Collection ,
Data Protection ,
FBI ,
Federal Trade Commission (FTC) ,
Hackers ,
Holiday Gifts ,
Information Technology ,
Internet of Things ,
Mobile Device Management ,
Mobile Devices ,
Risk Management ,
Smart Devices ,
Vulnerability Assessments
The Centers for Medicare and Medicaid (CMS) has announced that approximately 220,000 Medicare beneficiaries’ card numbers have been compromised “by an unknown person or organization.”...more
Although Amazon and Google respond to reports of vulnerabilities in popular home smart assistants Alexa and Google Home, hackers continually work hard to exploit any vulnerabilities in order to listen to users’ every word to...more
10/25/2019
/ Amazon Marketplace ,
Connected Items ,
Cyber Attacks ,
Cyber-Stalking ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Department of Health and Human Services (HHS) ,
Eavesdropping ,
Enforcement Actions ,
Federal Trade Commission (FTC) ,
Google ,
Hackers ,
Information Security ,
Information Technology ,
Mobile Apps ,
OCR ,
PHI ,
Phishing Scams ,
Popular ,
Risk Management ,
Smart Devices ,
Vulnerability Assessments
Although Amazon and Google respond to reports of vulnerabilities in popular home smart assistants Alexa and Google Home, hackers continually work hard to exploit any vulnerabilities to be able to listen to users’ every word...more
10/25/2019
/ Amazon Marketplace ,
Connected Items ,
Cyber Attacks ,
Data Privacy ,
Eavesdropping ,
Google ,
Hackers ,
Information Security ,
Information Technology ,
Phishing Scams ,
Popular ,
Risk Management ,
Smart Devices ,
Vulnerability Assessments
As most of you know, I rarely download an app. However, here’s one I just downloaded and here’s why. The Jumbo Privacy app, available in the Apple store, is all about providing consumers with a way to audit their privacy and...more
10/24/2019
/ Apple ,
Dark Web ,
Data Protection ,
Information Security ,
Mobile Apps ,
Mobile Device Management ,
Mobile Devices ,
Personally Identifiable Information ,
Privacy Concerns ,
Risk Management ,
Security Audits
A recent Ponemon Institute study finds that small and mid-sized businesses continue to be targeted by cybercriminals, and are struggling to direct an appropriate amount of resources to combat the attacks....more
10/17/2019
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Hackers ,
Personally Identifiable Information ,
Popular ,
Risk Management ,
Vulnerability Assessments
Everyone should be aware that October is National Cybersecurity Awareness Month. TechNewsWorld is urging all users to “Own IT,” which “means staying safe on social media, updating privacy settings, and keeping tabs on apps....more
The Federal Bureau of Investigations Internet Crime Complaint Center (IC3) recently issued a public service announcement warning private companies about the increasing numbers of ransomware attacks affecting private industry....more
10/14/2019
/ Business Interruption ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
FBI ,
Hackers ,
Incident Response Plans ,
Information Technology ,
Internet ,
Mobile Apps ,
Online Platforms ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
Risk Management ,
Vulnerability Assessments
I have been hanging out a lot with Chief Information Officers (CIO) and Chief Information Security Officers (CISO) these days at speaking engagements and conferences, as October – National Cybersecurity month – is always...more
10/4/2019
/ Chief Information Security Officer (CISO) ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Hackers ,
Malware ,
Phishing Scams ,
Ransomware ,
Risk Management ,
Spam
I am not a big fan of putting all of one’s passwords in one place, but many people use password managers. If you use Last Pass (see previous blog posts about Last Pass here and here), be aware that it was recently advised by...more
9/20/2019
/ Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Security ,
Google ,
Multi-Factor Authentication ,
Online Platforms ,
Passwords ,
Risk Management ,
Search Engines ,
Vulnerability Assessments ,
Websites
Although the number of security vulnerabilities reported in the first half of 2019 have reported dropped a bit from last year, a new report by Risk Based Security states that 34 percent of the 11,092 vulnerabilities...more
New Hampshire Governor Chris Sununu recently signed the New Hampshire Insurance Data Security Law, which “establishes the exclusive state standards applicable to licensees for data security, the investigation of a...more
It is so hard to keep up with the latest ways the bad guys try to infiltrate company data. One new technique is called warshipping, and its implementation is pretty simple and a little old school....more
I once again had the pleasure of presenting Cybersecurity for Tax Professionals at the IRS Nationwide Tax Forum today. The conference is designed for tax professionals in small- to medium-sized businesses....more
8/9/2019
/ Cell Phones ,
Consumer Information ,
Data Collection ,
Location Data ,
Location Privacy ,
Mobile Apps ,
Mobile Device Management ,
Mobile Devices ,
Mobile Privacy ,
Personal Data ,
Privacy Concerns ,
Privacy Settings ,
Risk Management ,
Smartphones
After the Capital One data breach, which was reportedly caused by an improperly configured firewall, every company should be paying attention to its firewalls....more
Many readers have reached out to learn about the Capital One data breach and how it affects us. If you haven’t been watching the story unfold as closely as I have, here is a summary of what happened, what information was...more
8/1/2019
/ Capital One ,
Class Action ,
Credit Monitoring ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Financial Services Industry ,
Gramm-Leach-Blilely Act ,
Hackers ,
Identity Theft ,
Personally Identifiable Information ,
Risk Management
The United States Treasury Department came out with a report last week that concludes that business email compromises (BEC) are costing U.S. companies more than $301 million per month. The report confirms that the two...more
7/25/2019
/ Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Email ,
Hackers ,
Manufacturers ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
Risk Management