The 10 Worst Government Data Breaches of 2012

Identity Theft

The 10 Worst Government Data Breaches of 2012

The 10 Worst Government Data Breaches of 2012

The 2012 political races were dominated by a debate about the “makers” vs. the “takers” among the American electorate. But it was government agencies themselves that were taken—by hackers, security flaws and employee ineptitude. Government agencies, from small county election boards to NASA, suffered data breaches. In fact, our federal and state governments have lost… Read More

The Anatomy of a Data Breach Investigation

Identity Theft

The Anatomy of a Data Breach Investigation

The Anatomy of a Data Breach Investigation

My phone rings whenever a client is hacked, suffers a data breach, or is a victim of identity theft via digital means. My job as chief information security officer is to look at all the digital evidence. When possible, I reconstruct the cyber attack. It’s C.S.I. work. By reconstructing the attack, often I can tell… Read More

The Bad Guys Know You’re An Olympics Addict

Identity Theft

The Bad Guys Know You’re An Olympics Addict

The Bad Guys Know You’re An Olympics Addict

It’s another manic Monday, and you’re racing to drop off the kids, fight traffic, and get to work in time—to watch the Olympics. Americans are putting in time at the office—not to do actual work, but to watch Misty May-Treanor and Kerri Walsh Jennings go for gold in beach volleyball. Or the hot, post-Hunger Games… Read More

Online Threats That Will Throw You Off the Security Balance Beam

Identity Theft

Online Threats That Will Throw You Off the Security Balance Beam

Online Threats That Will Throw You Off the Security Balance Beam

By Ondrej Krehel By now you’ve all seen the video of American gymnast Aly Raisman’s parents wincing, twisting and turning in their seats as they watched their daughter compete for Team USA in the Olympics gymnastics competition. (If you’ve been off the grid, check it out here.) We know how they feel, because when we see… Read More

12 Security Best Practices for USB Drives

Identity Theft

12 Security Best Practices for USB Drives

12 Security Best Practices for USB Drives

How do most corporate data breaches happen? Lost laptops and USB drives. Now many businesses have some kind of security practice in place for lost corporate computers, whether it’s encrypted drives with remote wipe, or a call lost-and-reporting procedure. But how many have USB drive best practices on the books? Not many. Yet USBs, because… Read More

Worse than Zombies: The Mobile Botnets are Coming

Personal Finance

Worse than Zombies: The Mobile Botnets are Coming

Worse than Zombies: The Mobile Botnets are Coming

As our smartphones have become our wallets and personal computers, holding everything from banking to social network information, they’ve become targets for hackers, scammers and criminals. Our phones hold a treasure trove of data—and the bad guys know it. A screen lock is no longer enough. Dream Droid, a botnet-type of malware program, recently infected… Read More

Game Over: Cloud Computing and the Sony Breach

Identity Theft

Game Over: Cloud Computing and the Sony Breach

Game Over: Cloud Computing and the Sony Breach

There’s been a lot of commentary and gotcha-style journalism surrounding the Sony data breach, but not much constructive criticism. Yes, the breach could have easily been prevented. Had Sony enabled fairly standard firewall technology and kept its systems up-to-date with the latest patches, none of this most likely would have happened. Since most of us… Read More

Digital Footprints: The Do Not Track proposal

Identity Theft

Digital Footprints: The Do Not Track proposal

Digital Footprints: The Do Not Track proposal

Are you being tracked online? The answer is yes. There are financial incentives for everyone from malicious hackers, to scheming governments, to an industry that has found a way to monetize your digital habits. Behavioral marketing—delivering ads to consumers based on their activity online—is an estimated $80 billion industry. The goal is to sell: cars,… Read More

The Legality of Technology

Identity Theft

The Legality of Technology

The Legality of Technology

Technology outpaces the law every day. New features are being adopted much faster than law enforcement and the court systems can keep up. This is a given at the high-speed crossroads of hi-tech and capitalism. Last fall, the federal courts covered some of the escaping ground as it relates to GPS tracking. An October editorial… Read More

Show Me More by Ondrej Krehel

Find out where you stand.
Get your FREE personalized credit report card.

Sign Up Now