There is post-war, post-modern, post-industrialist, and even the post-post rush of social media. (How many likes did I get? Am I valued in the world?) To advance into the world we’re creating, we often seem to be stumbling backwards. […]
Ever gotten one of those emails that lets you know your account has been hacked? Maybe it was your email account, and all of your contacts received a quirky email from you unawares, touting the benefits of a particular enhancement drug or the prospects of a Nigerian fortune. Those are pretty common. But how about [...]
If somebody stole to most important artifacts of your life or your business, how much would you pay to get all of that back? And if the price was so low, on a relative scale, that you could minimize the effects of the intrusion, would you act quickly? Chances are, you answered yes to both, [...]
Do you remember 1986? The first class was inducted into the Rock and Roll Hall of Fame, the Challenger Space Shuttle disaster rocked our world, and Top Gun was the highest grossing film of the year. That year also brought us the Computer Fraud and Abuse Act (CFAA), a law that many have suggested hasn’t [...]
So you say you’re not a Yahoo user, that the news of their latest breach is no concern of yours. That sound about right? Well, you may be right, but consider also that the exploit used in the latest breach (early February) has far-reaching implications for anyone who takes even the first step onto the [...]
It’s 2014. Do You Know Where Your Data Is? You have racks of servers and migrate data religiously to the cloud and off-site storage. Your IT staff builds a firewall and posts a guard. Your commitment to network security is unparalleled in the industry. That’s the good news. The bad news? Security is always about [...]
Recently, Splash Data released a list of the 25 worst passwords for 2013. It contained all the usual suspects for “so easy to hack as to be utterly useless.” Many people continue live a fantasy life of protection by relying on 1111, 1234, or “password” to secure their most valuable information with a password that a 5th grader could crack in less than 10 seconds. Here's an easy way to create a complex password that is unique to every website or application and dramatically increases your personal security by exponentially increasing the difficulty of hacking your information.