03 Jun 2019

Is FOMO Today’s Addiction?

LOL, LMAO, BRB, IMHO, OMG, BTW, FWIW, ILY, THX, JK. Ahhh, all of those elegant overused texting abbreviations that we all know. What about FOMO? FOMO or the “Fear of Missing Out” is that nagging feeling that you are not included in current trends or aren’t experiencing the same level of excitement that those around you are. For those of the Snapchat generation, it is the lure that creates the urge to quickly open a new message, to see what is... Read more...

28 May 2019

Your Friends Siri and Alexa Have Changed IT Security

Your close friends Siri and Alexa may have done more to change how IT staff are re-inventing how they think about Internet security than years of tech tips and training sessions. In a Siri and Alexa world, we normal humans are trained to believe that what you need is a click or voice prompt away. Anything. And, it should just work. Never mind the thousands of Amazon human workers all over the world that are the ones actually listening to your Alexa... Read more...

20 May 2019

Folklore of Opportunistic Privacy

There is a wide body of people that believe they are sending information private because they are sending using Microsoft Office 365, Gmail, or using a third-party service that sends all messages using transmission layer security. And they may be right; if secure sometimes is good enough. There is the notion of “opportunistic privacy” also referred to as “opportunistic TLS”, which sounds pretty cool. It certainly sounds secure. But... Read more...

13 May 2019

Pig Latin, Russian Spies and Email Encryption

With the recent media focus on cybersecurity, whether it is talk of Russian hackers scheming to influence US presidential elections, or the pervasive pressure to comply with GDPR or HIPAA (healthcare privacy regulations) or other consumer data privacy requirements, “encryption” is one of the solutions that is often introduced. When sending email, email encryption can indeed protect your strategic dialog from potential exposure, and its mere use... Read more...

06 May 2019

Vacationing in the Bahamas? Leave Your Laptop at Home

The constitution provide certain privacy rights. Attorneys and their clients generally enjoy extra protections on privacy with “privileged” correspondence. But what happens if the information is inadvertently exposed? There are all sorts of pitfalls that can expose your sensitive information. Here are some shocking ones. File sharing services can cause waiver of attorney-client privilege if files are not send with an encrypted link.... Read more...

29 Apr 2019

Caution. What You Might Find When Posting Your DNA Online

More than one in twenty Americans have voluntarily submitted their genetic code – the map of who they are personally and physically – to an Internet company. Most people were lured by cute TV ads creating curiosity about heritage. Your DNA is a genetic code defining your traits. Without boring you on the biological aspects of this, the DNA submission may unknowingly and irrefutably connect you to relatives (newfound siblings, parents, etc.) that... Read more...

15 Apr 2019

Today’s Hackers Target Executives with Simple Social Engineering

Today’s hackers are more innovative. Rather than just running up charges on your credit card, they are looking to extort money in exchange for return of your private information or to limit their use of it. For insurance executives, private information often includes emails related to customers and their policies. Data could include confidential information about assets, employees, vendor contracts and bank accounts. These more innovative hackers... Read more...

08 Apr 2019

Google AMP Ends Email as a Record of Who Said What When

Wow! It is strange that one still trusts a printed or PDF’d email as a record of who said what when. Microsoft did its best to make it clear that any email can be easily altered, with a few mouse clicks. For those unaware, try this in Microsoft Outlook: open an email, click Actions, click Edit Message, change the message, save, close, open again, and magic – your email content has forever changed without detection! Watch video You can also... Read more...

20 Mar 2019

Fake Facebook and Email

Wow! What a beautiful vacation that friend of a friend posted in their Facebook account. It looks like the perfect family vacation; all smiles, all sun, some commentary about the perfect spot… Is the perfect life of your friends’ friend depressing you? How could their experiences be so perfect, while when you go on vacation, you are hit with reality; some rain, crowded hotels, delayed flights, travel stress, kids complaining… Well,... Read more...

07 Dec 2018

Not All TLS is Created Equal

Security Image

Many, many software service sales professionals throw around security phrases to make cyber security sound simple. Today, as technologies advance and threats get ever more sophisticated, encrypting email for privacy compliance is not getting simpler. The devil (hacker) is in the details. Here, we will try to (in a simple manner) decipher a commonly referred to catch all for security, TLS, and explain why the details are important. “Not all TLS is... Read more...

Security Image