Many thanks to CPO Magazine for publishing my recent article Cyber Insurance Becoming a Necessity, No Longer a Luxury for Prepared Companies. In reality, there is no “secure” — even when the best security measures are taken. When hackers want to get in and disrupt a business, they will. Companies must be resilient, and the … Continue reading Cyber Insurance Becoming a Necessity, No Longer a Luxury for Prepared Companies (publication)
Cyberbullying -- like plain "old fashioned" bullying -- is a heartbreaking to see, especially when it is directed at innocent children. There are many things that can lead to it and there are many things that can help minimize it. I do not pretend to have all of the answers and, you can bet, if … Continue reading Cyberbullying of Children is a Heartbreaking Problem that Parents Have a Role in Preventing
Dear friends who keep talking about "hacked Facebook accounts": When there is an account that is pretending to be your account on Facebook (or other social media platforms) that is sending friend requests to others, in most cases, this does not mean that your account has been "hacked" (i.e., inappropriately accessed by someone other than … Continue reading “Hacked” Facebook Account — or Cloned?
https://youtu.be/BdaXgPawspo Cybercriminals are using yet another new twist on the old email phishing attack: they email people claiming to have infected porn sites with malware that allowed them to take over the recipient's webcam and record them sitting at their computer watching porn and if they don't pay up, the video is going public. I discuss … Continue reading Did hackers record you watching porn? New scam using key elements of phishing and shame hacking
The EU's GDPR, devices and services snooping on our privacy, and data privacy law - what does this all mean? Shawn Tuma explains to CW33's Morning Dose why the EU's General Data Protection Regulation (GDPR) can be a positive step in the long run for simplifying data security and data privacy when compared to the … Continue reading GDPR, snooping tech, and data privacy — what does this all mean? Shawn Tuma explains