Late yesterday, the State Department re-opened the investigation on whether or not Hillary Clinton, along with her aides willfully mishandled information of a classified nature. About 22 emails from Hillary’s private server were determined by the State Department as being “top secret”. With that being said, Attorney General Loretta Lynch stated that no indictments from the FBI probe.
A new form of malware for Android devices is out there called HummingBad. Experts are issuing a warning to all Android users.
This annoying malware program was first discovered in February and has been closely watched, with a recent status update stating that it has gone from “Bad to Worse”. Security experts and researchers have been studying the malware for five months to figure out its operation.
“Few think that the threat is real, but it is more likely that your data will be stolen than your home broken into.” – Nathan Neil
On Feburary 10th of this year, the Internal Revenue Service reported that cyber criminals succeeded in using 101,000 social security numbers to electronically file returns. They attempted with almost 500,000 social security numbers.
In 2015 for a period of seven days, Yahoo’s ad network was affected by malicious actors who embedded malware into their ads that were populated on many of the search giant’s pages. The hackers took advantage of the ad network to distribute their malicious code, which affected individuals who had older versions of Adobe Flash. The hack would have not been detected if it was not for Malwarebytes security researchers who discovered it.
Last month, my book Securing Business Data was released for Amazon Kindle. What is so exciting is that through eBook distribution my message on establishing a core value of data security can reach the most people! Kindle Unlimited subscribers can read the book for free and it is also available in the Kindle Lending Library. If you do not have Unlimited or Prime, you can purchase the book for $3.99,
This book covers topics that are vital to establish a core value of data security and prevent potential data breaches. We take a look at the hardware and software components like firewalls, antivirus, and anti-spam. We also take a perspective on securing your website, mapping out where your data and devices are located, in addition to providing the reader with information to establish strong employee policies and procedures. A unique quality of this book is that it even goes into detail on how to present your new core value for data security to employees. (more…)
With all of the data breaches that I have reported on and researched in the last three years and the lack of an overall action plan for businesses to establish a core value of data security, I felt an obligation to put together a book to help business owners and managers to put the policies and procedures in place to protect their business. My book, Securing Business Data: Establishing a Core Value For Data Security, will be released later this month, exclusively on Amazon. The book covers a variety of topics, including how to assess your hardware and software protection measures, along with the more vital item of addressing the human element of data security. (more…)