data

Home/Tag: data

Your Email is the Treasure Hackers Want to Plunder

Personal Data Protection Education is the Best Defense Series 2 of 6 Email is the preferred method of hackers to steal data and extort money. Layer 8 Security wants our community to be safe with their personal information by playing it smart. Please pass this information along to co-workers, family and neighbors. These recommendations will benefit not only yourself but also your workplace. Email C-level executives are often targets of spear phishing attacks. One such scheme attempts to steal money [...]

2017-06-22T20:19:37-04:00By |Tags: , , , , , |

Identity Protection for Those Affected by the OPM Data Breach

Layer 8 Security specializes in improving the cybersecurity posture of companies big and small, but we also strive to protect individuals as well. In keeping with our "sheepdog" mentality, I want to broadcast some important information to individuals affected by the Office of Personnel Management (OPM) data breach. If you were not one of the 21.5 million individuals targeted in the widely publicized OPM data breach announced this past June, there is a high chance that you are related to or [...]

Long Awaited Cybersecurity Bill – CISA 2015

The Cybersecurity Information Sharing Act (CISA) of 2015 recently became law before the new year. The proposal, while controversial, has evolved into what amounts to Congress’s first major policy response to cyber attacks that have hit Target, Home Depot, JPMorgan Chase, and Sony Pictures, as well as government agencies. Information-sharing legislation has failed in Congress for years amid privacy advocates’ concerns about broadening the surveillance of U.S. citizens by giving more data to the National Security Agency, the government’s electronic surveillance department.  The privacy [...]

What’s the deal with LifeLock?

I often get questions from friends and family about LifeLock, an identity theft protection service - what it's all about, whether I use it (I don't), how effective the LifeLock services are, etc. Ironically, about a week and a half ago, LifeLock agreed to pay $100 million (see here) for allegedly breaching a FTC order by: "Failing to establish and maintain a comprehensive security program to protect its customers' sensitive personal information, including Credit Card, Social Security, and bank account [...]

Terms of Service and Privacy Policy Changes Making the News

Today, Snapchat, the popular social media mobile app that allows users to send instantly-destructible pictures and videos to friends, has been in the news (here, and here) because of recent changes to its Terms of Service (ToS) and Privacy Policy. Here are some key initial takeaways from this news event: Security changes matter to consumers -- and are getting due coverage. As a consumer, it's great to see these policy changes make the news. A couple years ago, it was unlikely that [...]

Why Companies Respond Slowly To Breaches

You'd think it would be a long, drawn out reason, with lots of calculations and pretty charts. It's not. Per a recent piece in CSO, firms respond slowly to most of these breaches because, in spite of what you might have thought, the costs are relatively low. For an example, the article cited the recent Home Depot credit card debacle. The net cost wound up being around $28 million dollars-which doesn't seem too small to most of us. Take out [...]

A Reminder On The Danger Of An Inside Job

If you haven't heard this before, then get ready to hear it a lot more now. While outsider threats can be and are a big deal, and obviously a major concern, one of the biggest areas of risk for ANY company is and will be it's internal resources. Put another way, you have to be as careful about those who you give access to, as you are with those who don't have access to your network and corporate resources. Just [...]

Why Ashley Madison Matters…To Everyone

Yes, there are no doubt some 36 million individuals who may be a bit uncomfortable currently, but the massive Ashley Madison hack ought to have a lot more people paying attention, for several reasons. For one thing, I've read the comments online, and so many people feel that this is justified, that neither Ashley Madison nor its customers deserve sympathy or leniency. Perhaps from a moral perspective that is true, but I am not the moral police and I won't [...]

New E-mail Extortion Campaigns Threatening DDoS Attacks

A warning to our clients and those concerned with the latest cybersecurity threats.  The FBI has issued an Extortion email PSA stating that there has been an exponential jump in the number of extortion threats sent via email to businesses of all sizes.  The threat involves the launching of DDoS attacks against a victim’s website unless or until a ransom is paid. This type of attack has been around for years, however they have recently grown in size, impact, and duration.  DDoS (Distributed [...]

Encryption for Everyone – Part 2 Windows

In part 2 of our blog series on encryption we will focus on those who are running Windows.  BitLocker is fairly easy to set up and will keep your data-at-rest safe while your computer is powered down. What is BitLocker? BitLocker is Microsoft's easy-to-use, proprietary encryption program for Windows that can encrypt your entire hard drive(s) as well as protect against unauthorized changes to your system such as firmware-level malware. System requirements To run BitLocker you need a Windows PC [...]