Cyber Security/Privacy

Employee Tracking: How to Balance Business Efficiency and the Right to Privacy

By: Christopher Lewis *| Staff Writer

By Rama (Own work) [CeCILL (http://www.cecill.info/licences/Licence_CeCILL_V2-en.html) or CC BY-SA 2.0 fr (https://creativecommons.org/licenses/by-sa/2.0/fr/deed.en)], via Wikimedia Commons

By Rama (Own work) [CeCILL (http://www.cecill.info/licences/Licence_CeCILL_V2-en.html) or CC BY-SA 2.0 fr (https://creativecommons.org/licenses/by-sa/2.0/fr/deed.en)], via Wikimedia Commons

With the advent of new technology, privacy concerns are becoming an increasingly hot topic of debate in many different forms. People across the globe are becoming more cognizant of the personal right to privacy and are working to protect it; however, other factions believe that technological advances and the integration of life and technology are worth the loss in privacy rights. Some believe that it is only a matter of time before we fall into the dystopian worlds that George Orwell and Ray Bradbury, respectfully, espoused in 1984 and Fahrenheit 451. Continue reading »

AmEx and Ripple Creating Waves with Blockchain B2B Payments

By: Whitney Hosey *| Staff Writer

https://pixabay.com/en/cyberspace-data-wire-electronic-2784907/

American Express is partnering with Ripple, a fintech startup, to introduce the option of instant blockchain secured payments between U.S. based businesses and U.K. businesses who bank with Santander UK.

Continue reading »

A Hack a Day Keeps Cybersecurity at Bay: The SEC and Cybercrime

By: Emily Marcum *| Staff Writer

https://pixabay.com/en/new-york-broadway-wall-street-2408785/

What do a consulting firm, a regulatory agency, and a consumer credit reporting bureau have in common? They are all members of the financial industry who recently fell victim to hacking. In the past month, hackers have successfully stolen sensitive information from the SEC, Equifax, and Deloitte. Although these three hacks varied in scope and severity, together they illuminate the “Achilles’ heel” of the financial industry, cybersecurity! Targeting the financial industry is an obvious choice. When asked why he robbed banks, the infamous American bank robber, Willie Sutton, said it best, “Because that’s where the money is.”

Continue reading »

Equifax or Equihacks?

By: Emily Marcum *| Staff Writer

https://pixabay.com/en/credit-card-master-card-visa-card-1520400/

Cybersecurity is not the next frontier for most businesses; in fact, it’s more or less the only game in town. Over the last decade, the phrase “cybersecurity” has echoed in boardrooms, courtrooms, and living rooms like never before. What was once intellectual chatter, has become a “fact of life for corporations and governments.” According to U.S. President, Donald Trump, “Cyber theft is the fastest growing crime in the United States by far.”  So, it is no surprise that consumers were recently greeted with yet another disappointing headline concerning Equifax’s massive data breach.

Continue reading »

Federal Cybersecurity: CIA Falls Victim to Hackers

By: Evan Reid*| Guest Writer

https://pixabay.com/en/close-up-code-coding-computer-2178341/

The latest in a string of government cyberhackings targeted the CIA. The trove of hacked files, code-named “Vault 7,” details how the CIA can hack into Apple and Android devices to gather text and voice messages before they are encrypted. The files also reveal the CIA’s capabilities to hack into Smart TVs and vehicle control systems, including models from Jeep. The hackers subsequently released the compromised content to WikiLeaks, which published the highly sensitive material on March 7th. White House Press Secretary Sean Spicer called the hacking “a major concern.”

Continue reading »

Has Privacy Become a Silently Enforced Business Strategy?

By: Maria Pigna*| Staff Writer 

https://pixabay.com/en/keyboard-computer-empty-private-895556/

It goes without saying that the new age of evolving technology has presented the world with a fast treadmill of development, with no choice but to hop on or be left behind in the dark past.  This has left modern businesses and the legal market in a frenzy, with outdated policies and unsettled issues.  For decades, great customer service has been about delighting your customers with friendly staff and business policies, but in this digital global economy, the game has changed.

Continue reading »

The California DMV is Putting Its Foot Down on Regulation for Top Notch Cybersecurity Laws in Autonomous Cars

By: Thomas Gaffney*| Staff Writer

By Dllu (Own work) [CC BY-SA 4.0 (http://creativecommons.org/licenses/by-sa/4.0)], via Wikimedia Commons

By Dllu (Own work) [CC BY-SA 4.0 (http://creativecommons.org/licenses/by-sa/4.0)], via Wikimedia Commons

Imagine yourself on your morning commute to work, but instead of sitting behind the wheel you are comfortably reclined in your bucket seat reading the newspaper and eating waffles for breakfast.  Does this sound too far-fetched?  Maybe not. No one is surprised that autonomous vehicles are currently a super-hot topic in the tech and auto industries.  Every big name in the tech industry (UBER, Google, Apple, Microsoft, Telsa, etc.) is working on its own version of autonomous driving software; and why would they not?  The first company to develop an autonomous car with driving capabilities better than that of a human will get an enormous upper hand in a market that is projected to be worth at least 42 billion dollars by 2025. No one is going to purchase an autonomous car if it is not safe, however, and some of the threats facing these vehicles are not coming from the road but from the internet.

Continue reading »

Who’s Listening: A Kid-Friendly Cyber Threat

By: Katherine Escalante*| Staff Writer

 https://pixabay.com/en/binary-black-cyber-data-digits-2170630/

At its core, CloudPets’s new toy brings a personal touch to a stuffed animal. A parent can send a recorded message through an app, which transmits through the stuffed animal, allowing your loved one to hear your voice.  However, this personal touch may come at the cost of your personal information, passwords, and access to your voice.  Like other toys that connect to the internet, this toy stores all that information in the cloud.  With scammers developing new ways of attaining personal information, this purchase is surely something parents will have to think about twice before buying.

Continue reading »

New York State is Setting a New Precedent on Financial Cybersecurity Regulation

By: Thomas Gaffney*| Staff Writer

https://pixabay.com/en/cyber-security-internet-security-1805632/

On March 1, 2017, Maria Vullo, Superintendent of Financial Services for the Department of Financial Services in the state of New York, promulgated Part 500 of Title 23 of the Official Compilation of Codes, Rules and Regulations of the State of New York, into law. This new regulation is more commonly referred to as the controversial NY state financial cybersecurity rule. Many financial institutions fought this rule vigorously because they view the bill as unprecedented, overly restrictive, and extremely costly for compliance.

Continue reading »

CIA Releases New Rules for Collecting Information on Americans

By: Maria Pigna*| Staff Writer 

https://www.cia.gov/portlet_content/home-slider-images/cia_seal_slider/image.jpg

On Wednesday, January 18, 2017, the Central Intelligence Agency (CIA) published in full, for the first time, revised rules for collecting, analyzing, and storing information on American citizens.  CIA General Counsel, Caroline Krass, told a briefing at the Agency’s headquarters in Langley, Virginia that the guidelines are designed “in a manner that protects the privacy and civil rights of the American people.”  The CIA refers to the rules as the revised Attorney General Guidelines and will become effective March 18, 2017, sixty days after they are signed by the Director of the CIA and the Attorney General.  Continue reading »