Yearly Archives: 2015

Home/2015

What’s the deal with LifeLock?

I often get questions from friends and family about LifeLock, an identity theft protection service - what it's all about, whether I use it (I don't), how effective the LifeLock services are, etc. Ironically, about a week and a half ago, LifeLock agreed to pay $100 million (see here) for allegedly breaching a FTC order by: "Failing to establish and maintain a comprehensive security program to protect its customers' sensitive personal information, including Credit Card, Social Security, and bank account [...]

Layer 8 Security Supporting Philadelphia Veterans at Union League’s Dining Out

PRESS RELEASE Contact: Casey Lipson, Sales and Marketing Coordinator casey.lipson@layer8cybersecurity.com December 11, 2015 Exton, Pennsylvania - Jeff Lipson, Executive Director of Layer 8 Security, and Dave Heilig, Software Solutions Director of Layer 8 Security, attended the annual Union League's Dining Out event at the Union League of Philadelphia. Proceeds from the event were donated to Philadelphia veterans. The guest of honor, pictured above with Jeff and Dave (left and right, respectively), was General Carter Ham, US Army (Ret). "It is an honor [...]

Protecting Our Seniors from Scams: The Importance of Education and Awareness

Recently, a friend of mine called me with a problem: his elderly father in law that was living with him had his bank account hacked; nearly $10,000 had been stolen. Could we help? We couldn't retrieve the money, but we did take a look at his father's laptop. Sure enough, it was rife with malware and a key-logger had gotten his bank credentials. Unfortunately, our seniors are vulnerable to scams. These come both in the form of phishing emails or, [...]

Anti-money laundering (AML) requirements for Investment Advisers – what you need to know

The United States Treasury, through its Financial Crimes Enforcement Network (FinCEN) has gone beyond publishing its notice of proposed rulemaking by imposing the Anti-money laundering (AML) requirements to both the opening and closing of the comment period, moving closer to implementation. When adopted, covered registered investment advisers (RIA’s) will be required to: File currency Transaction Reports (CTR’s) and maintain detailed records of the transmittal; Implement and AML program crafted for their particular use; File Suspicious Activity Reports(SAR’s), where applicable; and Become [...]

You Are Only As Secure As Your Weakest Link

And, would you care to guess who your weakest link is, in terms of maintaining good security? According to a recent study, those folks most often tasked with keeping things secure for the enterprise, are also actually the ones most likely to cut corners themselves. When I saw that, I initially wanted to be stubborn and deny it was possible. But after a quick thought, I realized it was more than likely spot on. Think about it. When the company [...]

2015-12-23T17:31:42-05:00By |Tags: , , , , , , , , , |

This Ain’t Your Daddy’s Phishing Trip

One thing we've likely all gotten, is an email from some "rich Nigerian prince" offering us millions, in exchange for a little legwork or some such activity. The scam is old, but surprisingly effective. You wire them what seems like a pittance, for what you expect will be a major financial windfall on the return. Except that the phisher isn't a prince and doesn't have millions. But, they do have that untraceable money order you just sent them. That was [...]

The Developing Cybersecurity Marketplace

The Economist recently published an article, "Cyber-security: The cost of immaturity" in their November 7th edition. In the article, the authors discuss how the "business of protecting against computer hacking is booming." To quote part of their article, "A report by Bank of America Merrill Lynch reckons the market is $75 billion a year now and will be $170 billion by 2020. Not only is demand soaring, but barriers to entry are low. Anyone able to spout out a bit [...]

Terms of Service and Privacy Policy Changes Making the News

Today, Snapchat, the popular social media mobile app that allows users to send instantly-destructible pictures and videos to friends, has been in the news (here, and here) because of recent changes to its Terms of Service (ToS) and Privacy Policy. Here are some key initial takeaways from this news event: Security changes matter to consumers -- and are getting due coverage. As a consumer, it's great to see these policy changes make the news. A couple years ago, it was unlikely that [...]

CLE Credit Class – Minimizing the Risk of Cyber Exposure for Today’s Law Firm

Layer 8 Security is hosting a class with Precise about reducing the risk of cyber exposure for law firms at the offices of Expert Technology Associates. To register for the event, visit http://www.eventbrite.com/e/minimizing-the-risk-of-cyber-exposure-for-todays-law-firm-1-pa-ethics-cle-credit-tickets-18650999642. See below for details!

Networking Reception at The Union League of Philadelphia – October 21, 2015

Layer 8 Security and managed security provider, eSentire, are hosting a networking reception at The Union League of Philadelphia. To register for the event, visit www2.esentire.com/UnionLeageOct21. See below for details!