I often get questions from friends and family about LifeLock, an identity theft protection service - what it's all about, whether I use it (I don't), how effective the LifeLock services are, etc. Ironically, about a week and a half ago, LifeLock agreed to pay $100 million (see here) for allegedly breaching a FTC order by: "Failing to establish and maintain a comprehensive security program to protect its customers' sensitive personal information, including Credit Card, Social Security, and bank account [...]
PRESS RELEASE Contact: Casey Lipson, Sales and Marketing Coordinator firstname.lastname@example.org December 11, 2015 Exton, Pennsylvania - Jeff Lipson, Executive Director of Layer 8 Security, and Dave Heilig, Software Solutions Director of Layer 8 Security, attended the annual Union League's Dining Out event at the Union League of Philadelphia. Proceeds from the event were donated to Philadelphia veterans. The guest of honor, pictured above with Jeff and Dave (left and right, respectively), was General Carter Ham, US Army (Ret). "It is an honor [...]
Recently, a friend of mine called me with a problem: his elderly father in law that was living with him had his bank account hacked; nearly $10,000 had been stolen. Could we help? We couldn't retrieve the money, but we did take a look at his father's laptop. Sure enough, it was rife with malware and a key-logger had gotten his bank credentials. Unfortunately, our seniors are vulnerable to scams. These come both in the form of phishing emails or, [...]
The United States Treasury, through its Financial Crimes Enforcement Network (FinCEN) has gone beyond publishing its notice of proposed rulemaking by imposing the Anti-money laundering (AML) requirements to both the opening and closing of the comment period, moving closer to implementation. When adopted, covered registered investment advisers (RIA’s) will be required to: File currency Transaction Reports (CTR’s) and maintain detailed records of the transmittal; Implement and AML program crafted for their particular use; File Suspicious Activity Reports(SAR’s), where applicable; and Become [...]
And, would you care to guess who your weakest link is, in terms of maintaining good security? According to a recent study, those folks most often tasked with keeping things secure for the enterprise, are also actually the ones most likely to cut corners themselves. When I saw that, I initially wanted to be stubborn and deny it was possible. But after a quick thought, I realized it was more than likely spot on. Think about it. When the company [...]
One thing we've likely all gotten, is an email from some "rich Nigerian prince" offering us millions, in exchange for a little legwork or some such activity. The scam is old, but surprisingly effective. You wire them what seems like a pittance, for what you expect will be a major financial windfall on the return. Except that the phisher isn't a prince and doesn't have millions. But, they do have that untraceable money order you just sent them. That was [...]
The Economist recently published an article, "Cyber-security: The cost of immaturity" in their November 7th edition. In the article, the authors discuss how the "business of protecting against computer hacking is booming." To quote part of their article, "A report by Bank of America Merrill Lynch reckons the market is $75 billion a year now and will be $170 billion by 2020. Not only is demand soaring, but barriers to entry are low. Anyone able to spout out a bit [...]
Layer 8 Security is hosting a class with Precise about reducing the risk of cyber exposure for law firms at the offices of Expert Technology Associates. To register for the event, visit http://www.eventbrite.com/e/minimizing-the-risk-of-cyber-exposure-for-todays-law-firm-1-pa-ethics-cle-credit-tickets-18650999642. See below for details!
Layer 8 Security and managed security provider, eSentire, are hosting a networking reception at The Union League of Philadelphia. To register for the event, visit www2.esentire.com/UnionLeageOct21. See below for details!