07 Dec 2018

Not All TLS is Created Equal

Security Image

Many, many software service sales professionals throw around security phrases to make cyber security sound simple. Today, as technologies advance and threats get ever more sophisticated, encrypting email for privacy compliance is not getting simpler. The devil (hacker) is in the details. Here, we will try to (in a simple manner) decipher a commonly referred to catch all for security, TLS, and explain why the details are important. “Not all TLS is... Read more...

Security Image
30 Nov 2018

Your Spit is Your Real Government ID

DNA Card

The DHS is using Congress’ “Real ID” Act of 2005 to require all US states to issue new, more robust IDs for air travel originating in the United States (source). Has the DHS missed the real opportunity, to consider today’s state of technology? There are already millions upon millions of dollars being spent to upgrade every citizen’s driver’s license to a “Real ID”. Why not, in the same process, associate each one’s retina scan, fingerprint,... Read more...

DNA Card
16 Nov 2018

Email Security Beyond the Soundbite

The ubiquity of smart phones and their apps have reduced the attention span for the masses. People now expect their information in big fonts, nice colors, and pretty pictures. In the tech world, while many services have features that are now described in simple sound bites, it is often the details that make one product work for a customer need; or work better than similar sounding alternatives. And, with heightened awareness of email security needs,... Read more...

21 Apr 2018

Is “Security by Obscurity” an Obsolete Concept?

The term “security by obscurity” has been around for a long time. Traditionally, this has referred to the idea that the best way to keep a system safe is to keep its design (and any potential vulnerabilities) a secret. To many, “security by obscurity” has also represented the idea that there is safety in numbers, such as on a social media network that has hundreds of millions of users. One might argue that the intersection of social media,... Read more...

23 Mar 2018

They Know Everything About You

Author:

You may already know Uber drivers now score YOU, the passenger, and that a customer rating indicates who they choose to pick up. But did you realize a score below 4 out of 5 could potentially drive up your costs (fewer drivers want to drive you, triggering premature “congestion” pricing)? Best Buy (and others) have shifted away from a “customer is always right” policy, now using your shopping and product return data to ban... Read more...

08 Jan 2018

James Bond Enters Cyber Security

Author:

Enter 2018. A new generation of cyber security risks bear names that make it sound like they were implanted by James Bond villains (“Spectre”), with worldwide doomsday impact (“Meltdown”), coupled with anti-virus programs used for international espionage (Kapersky Labs allegations). In short, “Meltdown” basically melts security boundaries which are normally enforced by computer hardware. “Spectre” is based on the root,... Read more...

30 Nov 2017

Foreign Journalists Discover Treasure in Bermuda

Author:

As enchanting as the Bermuda sea is, during rough weather, Bermuda’s beguiling reefs have been the source of many lost ships over the past hundreds of years during trans-Atlantic journeys shipping treasures and taxes from the Americas to Europe. However, no one could have anticipated the rough waves that just crashed upon some of the world’s richest and most well-known companies as the true hidden treasure in Bermuda had long been a quietly kept... Read more...

02 Nov 2017

Should you Trust your Fax?

Author:

Habits are often hard to break. Some professional offices, particularly in the health care sector, when there is a need to send something private, send by fax. Their belief is, if they send by fax, the transmission is secure and private (HIPAA compliant). While they may have maintained this way of communicating out of habit or by policy, the environment in which they are communicating has changed. No longer, at the receiving end, are people receiving... Read more...

09 Oct 2017

Wilmer Hale (Accidentally) Sends WSJ Client Strategy

A staffer at Wilmer Hale, one of the world’s largest and most prestigious law firms, sent client confidential SEC-Whistleblower strategies of PepsiCo, their client, to the Wall Street Journal by accident. How could this happen? Human error, they claim. In this situation, the staffer was sending the internal client secret memo to other staffers and accidentally added a person at the Wall Street Journal (WSJ) as one of the recipients. It appears the... Read more...

28 Sep 2017

$4 Billion: The True Cost of a Data Breach

Equifax has lost over $4 Billion or about 25% of its market value as well as the CEO, CIO and Chief Security Officer, following the data breach announced in early September. Over 50 class action lawsuits have already been filed against the Company and there may be a congressional investigation into the breach. Consumers whose data was stolen will spend time and money ensuring that their financial data is secure. They will be spending sleepless nights... Read more...