When it comes to cyber authentication, the weakest link is the user. Cyber authentication is a hot topic in today’s world of Malware, Cyber Warfare, BYOD, Cloud Computing and Hackers. In a recent Google Password Management blog, “Google Password Management Tips...
Mark Zuckerberg, Did you miss the class discussing “Privacy” at Harvard? As you fill your Facebook account with family. friend and new contacts, it is obvious that Privacy is not a word that Facebook cares about or understands. In some recent articles...
They Are Just Drawn That Way Paraphrasing a line from Jessica Rabbit from the movie Roger Rabbit seems the appropriate comment from Geoffrey A. Fowler’s article “What’s a Company’s Biggest Security Risk? You.” Hence the headline: Employees Are Not Evil – They...
Data breach can affect other “SoNet” Junkies The hack of the social networking (“SoNet”) giant LinkedIn may have made your company more vulnerable to a data breach. The recent attack where 6.5 million passwords were posted on a Russian online...
A Data Breach can still bankrupt a business In Ponemon Institution’s annual “Cost of Data Breach Study” shows that the cost per record lost and the average cost of a data breach dropped in 2011. The cost per record dropped from $214 to $194, and from an average breach...
Google is gathering your personal and corporate data. Google Inc. (GOOG) motto is, “do no harm.” But who defines what is harmful? Employees recently testified to the U.S. Federal Communications Commission that they didn’t initially know that their...