The Smart Age

data security in the smart age

As both tech industry workers and consumers, we face a host of challenges. The recent attacks on Adobe, LivingSocial, Target, and Neiman Marcus have put nearly everyone in the country at risk, and the emerging “Internet of Things” promises to compound our security challenges by demanding an entirely new layer of data protection in our [...] Read more »

Retail, Data Security, and Smart Cards

Shopping trolley on button of computer keyboard

Speculation is plentiful throughout the tech sector following a report Friday night from Neiman Marcus. According to the retail giant, they’ve suffered a huge data breach that affects untold thousands of credit card customers. As of this writing, no definitive number has been provided by either Neiman Marcus representatives or credible news agencies, but with [...] Read more »

What To Do if your Small Business is Hacked

small business data security

CNN, PCWorld, and the Harvard Business Review have all published recent articles on the upward trend in hacker attacks against small businesses throughout the country. The shift from large corporate targets to smaller operations makes sense from the view of a cyber criminal: with more and more business data being stored locally by companies of [...] Read more »

The Great LinkedIn Lawsuit

Linkedin data security lawsuit

A previously dismissed lawsuit against LinkedIn has once again emerged in the news, as Khalilah Wright – the sole remaining plaintiff in what was once a class action complaint – has pivoted her litigation around a new claim that the social media giant used outdated and obsolete data security measures. The story so far: a [...] Read more »

A Sign of the Times

new york times hacked

The NY Times website came down last week, marking the second time in a month that the venerated news agency suffered a prolonged service interruption. While the first outage has been identified as an internal error likely caused by an overworked, underpaid, and thoroughly remorseful IT technician, the cause of this latest outage was far [...] Read more »

First Generation Android Virus Discovered

An interesting development in the mobile device world is developing, thanks to research performed by global anti-virus and software security company Symantec. It appears that the first of what will undoubtedly be many fake antivirus programs targeted at Android devices has been captured. The app – listed under the moniker “Android Defender” – is a [...] Read more »

HIMSS 2013 Shines a Light on Health Care Cybersecurity

The 2013 Healthcare Information and Management Systems Society (HIMSS) annual conference took place earlier this year in New Orleans, Louisiana, and while the content was tailored specifically for the health care industry, much of what was shared at this event can be folded into the strategies of data protection specialists across a broad range of [...] Read more »

Software, not Hardware

Here at DSW, we are consistently flabbergasted by the poor decisions made on enterprise-level data security policies – and these poor decisions are not limited to small-time start-ups, but include large conglomerates and corporations around the world. IT techs and managers know exactly what I mean – chances are you’ve seen more than your share [...] Read more »

Four Easy Ways to Mess Up Your IT Policy

Here at DSW, we burn through a great deal of material on data security policy during an average week, and we encounter a wide range of actions, reactions, procedures, and strategies that involve just about every facet of the IT industry. As a result, we get to see first-hand the decisions made by IT managers [...] Read more »

Should FTC Powers Include Cyber Security Mandates?

The Federal Trade Commission made a brave move last Friday in announcing a joint settlement with noted mobile device producer HTC America. In an effort to ensure ongoing protection of consumer data, this settlement compels HTC to develop a series of solutions intended to shore up the security holes presently peppering many of the devices [...] Read more »

Next Page »