The 2015 Anthem data breach affected 79 million people and was the largest health-care data breach in U.S. history. The affected consumers sued Anthem in a case that settled for a record $115 million. Now the U.S. Dept. of Health and Human Services’ Office of Civil Rights has reached a settlement with Anthem for a record…
Tag: Cybersecurity
Trump and Kanye West Bring Emphasis to #CyberAware Cybersecurity Awareness Month With Password Example
October is National Cyber Security Awareness Month in the United States. There is excellent cyber awareness content available by going to #CyberAware and #CyberAvengers hashtags on Twitter and visiting The #CyberAvengers Website for free resources, including this free Good Cyber Hygiene Checklist. President Trump and Kanye West put a big ‘ole Texas-sized exclamation point on the [need for?] #CyberAware campaign with Kanye’s password demonstration…
Did hackers record you watching porn? New scam using key elements of phishing and shame hacking
Cybercriminals are using yet another new twist on the old email phishing attack: they email people claiming to have infected porn sites with malware that allowed them to take over the recipient’s webcam and record them sitting at their computer watching porn and if they don’t pay up, the video is going public. I discuss this…
Why do you need a cyber attorney? Shawn Tuma explains in Ethical Boardroom
In my latest article in Ethical Boardroom article, I explain some of the not-so-obvious reasons why you need an experienced cyber attorney on your team: Why you need a cyber attorney (Spring 2018) Here are other Ethical Boardroom (@EthicalBoard) articles that I have written or contributed to that are also available for free: Cybersecurity: A Fiduciary Duty…
What does it mean to “hack back” and is it a good idea?
There is more and more talk about companies hacking back against those who attack them in cyber space and whether allowing them to take such measures is a good idea. Right now, hacking back, or active defense, as it is often called, is illegal under the federal unauthorized access law, the Computer Fraud and Abuse…
Can your company do business without its computer system? Let’s ask Atlanta!
In the world of cybersecurity and data protection, we tend to think about most cyber incidents as being “data breaches” because that’s the term de jour that occupies news headlines. Because of this, far too many companies think that if they do not have valuable data that hackers would want to “breach,” so to speak,…
Down the Security Rabbithole Podcast #DtSR with Los and Tuma talking all things #cybersecurity
This week’s #DtSR Podcast featured Raf Los and guest Shawn Tuma talking about all things cybersecurity. Check out more of what was covered and listen to the podcast here! Check out some of the past episodes with Tuma as a guest. Share on social media and join in the discussion! This week on #DtSR…
Security Weekly guest Shawn Tuma discusses “what is reasonable cybersecurity?”
Share on social media and join in the discussion! LinkedIn Post I really enjoyed joining my good friend @catalyst on Security Week today to talk about "what is reasonable cybersecurity?" — Business Security Weekly Episode #76 https://t.co/bINnEhrlkQ — Shawn E. Tuma (@shawnetuma) March 3, 2018
Marine corp data breach lesson: human error is often the cause and is preventable
There has been a data breach emanating from the U.S. Marine Corps Forces Reserve that impacted 21,426 individuals. The breach exposed their sensitive personal information such as truncated social security numbers, bank electronic funds transfer and bank routing numbers, truncated credit card information, mailing address, residential address and emergency contact information. Calm down and press the…
What is “reasonable cybersecurity” and how do courts view it? (SecureWorld interviews)
What is “reasonable cybersecurity” and how do courts view “reasonable cybersecurity”? See KnowB4’s discussion of these interviews These are two excellent questions that I was asked and I answered, as succinctly as I could, in two short interviews with SecureWorld. Tell me what you think about my answers. What Is Reasonable Cybersecurity? – SecureWorld article…
You must be logged in to post a comment.