Temin and Co.

Must Reads-Cybersecurity

CyberSecurity Board Basics: Prep, Watch, React & Report

David A. Katz and Laura A. McIntosh, Directors & Boards, August 17, 2017

Recent global cyberattacks have rudely reminded corporate America that cybersecurity risk management must be at the top of the board of directors' corporate governance agenda. Companies have no choice but to prepare proactively, while directors must understand the nature of cybersecurity risk and prioritize its oversight. Preparation, monitoring, emergency response and disclosure are topics that boards should consider regularly to properly oversee cyber risk management. [...read more]

The Behavioral Economics of Why Executives Underinvest in Cybersecurity

Alex Blau, Harvard Business Review, June 7, 2017

Determining the ROI for any cybersecurity investment, from staff training to AI-enabled authentication managers, can best be described as an enigma shrouded in mystery. The digital threat landscape changes constantly, and it's very difficult to know the probability of any given attack succeeding — or how big the potential losses might be. Even the known costs, such as penalties for data breaches in highly regulated industries like health care, are a small piece of the ROI calculation. In the absence of good data, decision makers must use something less than perfect to weigh the options: their judgment. But insights from behavioral economics and psychology show that human judgment is often biased in predictably problematic ways. In the case of cybersecurity, some decision makers use the wrong mental models to help them determine how much investment is necessary and where to invest. [...read more]

Your Internet privacy could be in trouble. Here's how to protect yourself.

Jhaan Elker, The Washington Post, March 24, 2017

The Senate and House have voted to repeal an FCC ruling that protects your Internet privacy and data from ISPs. This video shares all the steps you can take to protect yourself.

Preparing for the 2017 Healthcare Cybersecurity Threats

Mac McMillan, HealthIT Security, January 27, 2017

Cybersecurity is a major concern for healthcare executives as we head into 2017. After two years of a steadily increasing cyber threat landscape that resulted in record numbers of patient records compromised, health organizations extorted financially and hospital operations disrupted very publicly, 2017 is likely to be just as interesting. Most organizations surveyed now report having had a major breach, making it all but expected that eventually having a cyber incident is a sure thing. [...read more]

Yahoo Faces SEC Probe Over Data Breaches

Aruna Viswanatha and Robert McMillan, The Wall Street Journal, January 23, 2017

U.S. authorities are investigating whether Yahoo Inc.'s two massive data breaches should have been reported sooner to investors, according to people familiar with the matter, in what could prove to be a major test in defining when a company is required to disclose a hack. [...read more]

China’s Cybersecurity Efforts Could Pose New Challenge for Foreign Firms

Paul Mozur, The New York Times, December 27, 2016

It has been a tough year in China for America's technology companies. Uber sold off its operations there. Beijing ordered some of Apple's services shuttered. And Microsoft faced a new inquiry. Now, in the final days of 2016, China's internet regulator suggested the coming year may be even trickier. A report by the regulator on Tuesday suggested it would formalize a cybersecurity review system on tech products in the country. That could mean another problematic step for foreign tech firms in what has already become a tough market. [...read more]

Identity Theft Jumps 57% as Fraudsters Target Social Media

Michael Hill, Infosecurity Magazine, July 5, 2016

The number of victims hit by identity theft jumped a hefty 57% last year, according to figures from fraud prevention service Cifas. The firm's research found that fraudsters are particularly targeting younger internet users with around 24,000 people aged 30 and under suffering identity fraud in 2015, up from 15,766 in 2014 and more than double the 11,000 victims in this age bracket in 2010. [...read more]

The cost of immaturity

The Economist, November 7, 2015

The average time between an attacker breaching a network and its owner noticing the intrusion is 205 days. Like most statistics touted by the cyber-security industry, it is little more than a guesstimate. But there is no doubt that criminals and pranksters are thriving by attacking computers and networks, that companies are struggling to cope and that businesses offering answers are charging fat fees. The penalties for getting cyber-security wrong are steep. Unsurprisingly, then, the cyber-security industry is booming. [...read more]

10M customers exposed in Blue Cross hack

The Hill, September 10, 2015

A New York Blue Cross Blue Shield plan revealed late Wednesday that it has been the victim of a massive cyberattack, exposing the data of more than 10 million people. The hack falls within the top 20 worst healthcare breaches ever reported, according to the Department of Health and Human Services' list of breaches, known in the industry as the agency's "wall of shame." [...read more]

Security issues remain as bio implants gain acceptance

Doug Olenick, SC Magazine, September 4, 2015

During the IFA electronics show in Berlin, Kaspersky Labs implanted a 2mm sub-dermal microchip into the hand of one of its employees that is capable of handling the same connectivity tasks as a smartphone or wearable, raising a bevy of security questions. The current level of security is minimal, using only a four-digit pin code, and is easily hacked, which Kaspersky is working to improve. [...read more]

Temin & Company | Website by Temin & Co.