Dear Reader,
Cybersecurity is becoming less arcane and more a topic of conversation for even non-technical people as awareness of the problems grows. Data Privacy Week began January 24 as part of that international education effort and our site is filled with appropriate content on the subject.
We also look into how the insurance industry handles (or doesn't) cybersecurity. Well, we all have to learn, and if you seek knowledge on the future, check out our article on the quantum threat. Prefer a story about the presence - read how the latest gadgets make stalking a lot easier. All in this first newsletter of 2022.
Enjoy reading!
Best regards
Patrick Boch & Lou Covey Editors
P.S.: We have something very exciting to share: our first actual magazine will be released next week, so keep an eye out for an e-mail from us - you'll be the first one to receive our first magazine issue.
|
| |
Privacy law
The European Union’s GDPR remains the gold standard for user privacy with other countries trying to emulate that set of laws. That isn’t stopping companies from trying to get around those requirements to their own peril. We interviewed Paul Smith of Sweeft Digital recently about the weaknesses of US laws and the California Consumer Privacy Act in particular. This will be the subject of ongoing reports in the coming weeks. For more on data privacy in general, read our special on the topic.
|
| |
US companies face hefty fines for GDPR violations |
We're talking with Paul Smith, country manager for Sweeft Digital, a UK agency helping companies manage their digital presence, including compliance with UK and Europe privacy regulations. He confirmed concerns… |
|
| |
Special: Data Privacy Day |
With the Data Privacy Day and the data privacy week, the end of January has a particular focus on protecting data. In our special on data privacy, read expert commentary,… |
|
| |
Your insurance may not be insured
Part of the growing awareness of data security is the need for insuring against cyber attacks, but our report about the struggles that industry niche is facing should be a cause for concern for companies large and small. |
| |
Insurance industry using weak reasons to not pay |
Payouts for ransomware are growing faster than the insurance industry can capitalize them. Premiums are rising and as a result coverage limits are dropping. Moreover, Insurance companies are using weak… |
|
| |
Quantum threats abound
If the inadequacies of government and insurance companies aren’t enough, we have to start considering the threat from quantum hacking. Ali El Kaafarani, founder and CEO at PQShield, gave an update on the fast approaching quantum apocalypse, urging people to start planning now/. The good news is that defensive technology is coming along as fast as the threats are growing. |
| |
Not if, but when: Why it’s time to prepare for the quantum threat |
In recent months, the drumbeat of warnings about the quantum security threat has reached an alarming crescendo. For a reason: the encryption standards we rely on today are at serious… |
|
| |
Stalking with Bluetooth
The media was all atwitter with the report that the Apple AirTag device could be used for stalking people so we did an investigation into the issue and found that while it could be done it was relatively easy to defend against it, We found, however, that GPS trackers, which are less expensive and readily available, are a greater threat
That article caught the attention of Pat Thurston, host of an afternoon radio show in San Francisco. She contacted us and had a lively discussion about the issue and what can be done. Here’s the link to the recording off the show.
|
| |
Stalking with Bluetooth tracking devices |
Technology companies traditionally ignore the safety downsides of their products. Bluetooth tracking devices can surreptitiously shadow people. But it's easy to disarm them. |
|
| |
White House taking security at rest seriously
Our friends at Digistor learned that the White House is taking securing data at rest (DAR) seriously as the required government agencies to implement multi-factor authentication (MFA) and encryption to secure DAR. Now if the rest of us would. |
| |
Coming up
In addition to coverage on privacy laws, we are working on coverage hardware security, things HR managers need to know about finding the right people for cybersecurity positions and the dangers of QR code scams. We’re always looking for new ideas and sources so drop us a line through the website. |
| |
Thanks for reading and if you liked our newsletter, please share it with friends and colleagues. |
| |
Cyber Protection Magazine
https://cyberprotection-magazine.com
| |
|