In my last post, we discussed how the FTC used its powers in commerce to protect customers from cybersecurity threats. We specifically looked at the case FTC versus Wyndham Worldwide…
In this series of blog posts, I’ll be looking at the Federal Trade Commission (FTC) charges against companies in the area of cybersecurity practices that put consumers at risk. The…
While cyber-attacks cannot kill tens or hundreds of millions of people in a single action, they are more dangerous in other ways. One particular way would be to silently undermine…
A top concern is, “do I have a false sense of security?” In other words: Are all my controls working properly? Any malfunctions, like a door that doesn’t close all…
Xfinity hotspots are a brand of public WiFi. And all public WiFi has this in common: It’s someone else’s network, and you can’t quickly know whether it’s safe or not….
Never! Set nonobvious answers to your security questions, then store those nonobvious answers in your high-quality, attack-resistant password manager. Either LastPass or 1Password are good choices. The reason security questions…
Q: What are the key topics you would cover in your initial one-hour basic training program on security for non-IT personnel? AND What sort of additional security related training might…
We’re continuing in our series of blog posts that cover some of the most common questions I get asked about cybersecurity. Here are the last few weeks of questions in…
We’ve just begun a series of blog posts that cover some of the most common questions I get asked about cybersecurity. Here are the last two weeks of questions in…
Here are my best practices for online passwords: Do not reuse passwords with different accounts. Ever. There is a major, often successful cyber attack pattern used against those people who…