Many government regulations address mobile device use, directly or indirectly, whether the device is government-issued or personally owned. For example, the Health Insurance Portability and Accountability Act (HIPAA) Security Rule is designed to protect an individual's electronic protected health information (ePHI) that is "created, received, used, or maintained by a covered entity." Because mobile devices can store data on the device, any ePHI exchanged when using the device is at risk of unauthorized disclosure. Using a mobile device connected to a public or otherwise unsecure Wi-Fi connection also poses a risk to ePHI because those connections are easily sniffed.

READ MORE [fa icon="chevron-right"]

Interbank Payments Are at Risk

[fa icon="calendar'] Nov 18, 2016 8:36:02 AM / by David Geer
posted in Finance, Government

[fa icon="comment"] 0 Comments

Payments between banks are vulnerable. Interbank payments are payments that banks and financial institutions make between each other nationally and internationally, using special banking payment systems. One example of such a system is CHIPS, the Clearing House Interbank Payments System in the United States. There are other systems, which operate within and between nations.

READ MORE [fa icon="chevron-right"]

Three market sectors could suffer millions to billions in losses. As of early October 2016, the ID Theft Center reports that hackers breached 601 organizations in the government, healthcare, and finance sectors as well as the business category. These attacks exposed more than 28 million records. Based on estimates of $200K to $4 million in losses from a data breach, the total cost of these breaches could range from $120 million to $2.4 billion.

READ MORE [fa icon="chevron-right"]

When it comes to cybersecurity, many school districts are woefully behind the times, often relying on web content filters older than their students to protect against cyber attacks. The thing is, cyber threats have evolved rapidly and the old tools just don’t cut it anymore.

READ MORE [fa icon="chevron-right"]

It wasn’t that long ago —around five years — that major industries, including higher education, had just started discussing cloud computing. Corporate CIOs pledged to never put mission critical systems out on the cloud, but that thinking has shifted today.

READ MORE [fa icon="chevron-right"]

Just as Target CEO Gregg Steinhafel stepped down after the retail giant’s credit card security stumble stymied 40 million customers, OPM CIO Donna Seymour relinquished her position in favor of retirement after the federal agency failed to protect personal information belonging to 21.5 million people.

READ MORE [fa icon="chevron-right"]

IT giant Cisco figured that, as of 2014, the world would be short 1 million cybersecurity pros to fend off the constant threat of online attackers, who seem to grow in number and sophistication by the minute. Meanwhile, as many as 1.2 billion people were estimated by Spil Games to be video-game players by the end of 2013.

READ MORE [fa icon="chevron-right"]

As the United States approaches the Presidential election this November, there will be more security threats, including an increase in misinformation perpetrated across social media, targeted attacks against voter information and election systems, and an overall lack of active engagement or understanding of cybersecurity risks by executive leaders.

READ MORE [fa icon="chevron-right"]

Cloud Is the Answer for K-12 Security Woes

[fa icon="calendar'] Apr 18, 2016 11:07:52 AM / by Pedro Pereira
posted in K-12

[fa icon="comment"] 0 Comments

You wouldn’t think it, but student data in school campuses has become a favorite target for hackers. School districts routinely collect an assortment of data on students, including attendance and medical records, and store it on their servers.

READ MORE [fa icon="chevron-right"]

The decision by a California judge to appoint a cybersecurity expert to maintain tight control over data on special needs students, which is required for a lawsuit, highlights the vulnerability of private student data being retained on school networks.

READ MORE [fa icon="chevron-right"]