Managing Online Risk’s Monthly Recap (Jan. 2017) – Stories Relating to Online Security & Risk

Security Computer Key Shows Privacy And Safety

Welcome to our recap of stories relating to Online Security and Risk. This month’s stories cover many issues including: Data Privacy Day – Jan 28; deleted vs. destroyed data; security lessons learned in 2016; cute selfie app collects data; 8 steps for better security; EU & privacy directives; AI, robots & security; security terms you should know; 10 people who are security risks; and more.

These are some of the articles, reports, posts, etc. that caught our attention this week. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a monthly recap. Some have links that will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. Others you need to go directly to our Twitter account to view. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.

Managing Online Risk’s Monthly Recap (Sept, 2016) – Stories Relating to Online Security & Risk

security words on a wrinkled piece paper

Welcome to our recap of stories relating to Online Security and Risk. This month’s stories cover many issues including: When AI goes to the dark side; National Cyber Security Awareness Month; Amy Schumer is most dangerous celebrity on McAfee’s list; Yahoo’s data breach; BYOD & social media biggest internal security threats; wearable technology; 7 deadly Internet security sins; Dropbox hack; anatomy of a social media attack; and more.

These are some of the articles, reports, posts, etc. that caught our attention this week. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a monthly recap. Some have links that will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. Others you need to go directly to our Twitter account to view. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.

Managing Online Risk’s Monthly Recap (June 2016) – Stories Relating to Online Security & Risk

Fireworks

Welcome to our monthly recap of stories relating to Online Security and Risk. This month’s stories cover many issues including: conversations business leaders need to have about security; digital patch kit against data leaks; is your social media hackable?; ransomware targeting Smart TVs; data security in the cloud; even Mark Zuckerberg got hacked; beyond backup for security; and more.

Have a safe, secure and fun 4th of July!

These are some of the articles, reports, posts, etc. that caught our attention this week. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a monthly recap. Some have links that will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. Others you need to go directly to our Twitter account to view. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.

  • Looking forward to this: Lo And Behold: Reveries of the Connected World – Official Trailer
  • Conversations business leaders need to have about security
  • 9 Critical GDPR Questions Answered by 3 Data Privacy & Security Experts
  • Data security trends in business, law ‪http://ow.ly/CkZF301Nfu3 
  • Digital patch kit: How to protect yourself from data leaks
  • A Storm Brews: Retailers Push Back Against Payment Card Industry Data Security Standards
  • FTC closes 70 percent of data security investigations ‪http://ow.ly/aTET301Ltwr 
  • Legal Bits & Business Bytes Monthly Lunch-n-Learn ‪http://ow.ly/PTMD301JksS 
  • BYOD can pose privacy risks to employees
  • Gartner’s top 10 security predictions
  • 5 Tips For Making Data Privacy Part Of The Company’s Culture
  • 5 data security questions smart city planners need to ask
  • 10 Data Security Mistakes Startups Can’t Afford to Make
  • Is Your Social Media Account Hackable? ‪http://ow.ly/jQwc301yz9l 
  • Executive Issues on Social Media
  • Recent changes to states’ data security laws | Lexology ‪http://ow.ly/apkg301w545 
  • The Always-On Culture + Mobile Access = IT Nightmare?
  • 5 Steps To Securing Yourself From Online Identity Theft ‪http://ow.ly/LxQv301tz1k 
  • Views on Encryption, Data Security Portrayal in TV Shows From ‘Mr. Robot’ Writer ‪http://ow.ly/zStz301tyLe 
  • Mobile ID At The 2016 Gartner Security and Risk Management Summit
  • Beware, this ransomware is seeking to target your Smart TVs
  • What’s Your Move? The Big Consideration for Data Security
  • Internet Security, AntiVirus, AntiSpam, AntiSpyware Quiz ‪http://ow.ly/7RNY301koI9 
  • Attorney General offers summer tips for online safety and security
  • 5 Ways to Defuse Data Threat from Departing Employees – eSecurity Planet ‪http://ow.ly/1Dfk301iL6R 
  • Negligence, not malice, the biggest threat to law firm data security
  • Legal Insider: New Social Media Policy for Security Clearance Investigations ‪http://ow.ly/Eybx301iKDx 
  • The Car Hacker’s Handbook digs into automotive data security ‪http://ow.ly/xSFW301hCEL 
  • Biggest Attacks Of 2016 (So Far)
  • 7 Data Classification Tips
  • When An Employee Leaves Your Agency, Make Sure Your Data Doesn’t
  • A Russian Cybersleuth Battles the ‘Dark Ages’ of the Internet
  • 10 Ways to Protect Social Media Passwords From Hackers
  • Facebook Messenger flaw revealed – CSO ‪http://ow.ly/Uppp30132Lg 
  • Data Security and the Insider Threat | Lexology ‪http://ow.ly/sdVp3012V5f 
  • Managing Online Risk’s Monthly Recap (May 2016) – Stories Relating to Online Security & Risk
  • 100 million social media accounts hacked, up for sale on dark web marketplace ‪http://ow.ly/jlYk3010aFT 
  • Even ‘Dead’ Social Media Sites Are a Gold Mine for Hackers ‪http://ow.ly/hkk43010aB6 
  • Cloudy Skies — Data Security in the Cloud [Infographic] ‪http://ow.ly/ragu3010aq4 
  • 4 Must-Follow Steps for Storing Client Data ‪http://ow.ly/3igy3010agA 
  • Even Mark Zuckerberg Got Hacked: Here’s a Basic Internet Security Mistake to Avoid
  • Law2sm’s Monthly Recap 06/01/16 – Stories Relating to Social Media & the Law ‪http://ow.ly/Es8s300YOTZ 
  • Biometrics technology is reshaping the landscape of the security industry ‪http://ow.ly/omg9300Xods 
  • National Security in a Data Age ‪http://ow.ly/lk7c300Xo7I 
  • Why legal departments begrudge the cloud
  • Obama Administration Releases Final Data Security Policy Principles & Framework ‪http://ow.ly/YzTB300Wf5V 
  • The Art of Intelligent Deception in Cyber Security ‪http://ow.ly/zqaK300Wf3L 
  • How to Protect Your Small Business as Cybersecurity Threats Rise
  • How to delete your smartphone data securely before selling your device
  • Millennials & Mobile Payments: What is the Price of Convenience?
  • Myth 8: data privacy & security law compliance is the provider’s responsibility ‪http://ow.ly/hjG8300SKlE 
  • 4 Effective Data Security Tips for Small Business ‪http://ow.ly/l6WE300SKik 
  • Can 2FA and biometric security be adopted for verification
  • The CSO 2016 Security Data Analytics Survival Guide
  • Security concerns rising for Internet of Things devices
  • Laws Governing Data Security and Privacy – U.S. Jurisdictions at a Glance 2016
  • Going out of business: An important, but forgotten security precaution
  • Beyond Backup: The Role of Security and Privacy in Data Protection ‪http://ow.ly/k2Sk300Nut6 

Data security is the most significant risk facing in-house counsel today ‪http://ow.ly/JVRt300NupW 

Managing Online Risk’s Monthly Recap (May 2016) – Stories Relating to Online Security & Risk

Virus Trojan Spyware Signpost Showing Internet Or Computer Threats

Welcome to our monthly recap of stories relating to Online Security and Risk. This month’s stories cover many issues including: alleviate top stressors in IT systems; 6 stages of incidence response; the role of online security insurance; is biometric data private; mobile security challenges; crafting a winning risk assessment; and more.

These are some of the articles, reports, posts, etc. that caught our attention this week. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a monthly recap. Some have links that will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. Others you need to go directly to our Twitter account to view. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.

  • What Is the Future of Mobile App Development? – DZone Mobile
  • Australia to auction seized Bitcoins – CSO ‪http://ow.ly/4t9d300KAEb 
  • How to Alleviate the 15 Top Stressors in IT Systems
  • Millennials Could Learn From Baby Boomers When It Comes To Security ‪http://ow.ly/d5Zv300Ec8p 
  • Social Media Compliance a Challenge for Enterprises
  • Clone Kimber new book: Legal Guidelines for Employers and Employees Dealing with CyberLaw Issues ‪http://ow.ly/WMtJ300zB9P 
  • Recommendations for Evaluating Your Organization’s Use of Social Media ‪http://ow.ly/CH5R300zdlE 
  • The Six Stages of Incident Response ‪http://ow.ly/irv2300zd6h 
  • What is Email Security? Data Protection 101 ‪http://ow.ly/DbQk300wvBo 
  • The role of online security insurance in business ‪http://ow.ly/VffN300wvry 
  • Google Innovates Online Security Measure, No More Passwords By The End Of This Year
  • How Should Companies Handle Data From Employees’ Wearable Devices? ‪http://ow.ly/OfCq300ufda 
  • Social Media: The Digital Footprint to Fraud ‪http://ow.ly/Ajr5300qldR 
  • Are YOU Hiring Robots Yet? | Global Sales Growth
  • 5 Essential Steps To Take After A Data Security Breach ‪http://ow.ly/3Ld7300pysu 
  • 10 Mobile Security Vulnerabilities and How to Address Them
  • Five Resources to Help You Deploy an Effective Mobile Security Strategy
  • Why a staggering number of Americans have stopped using the Internet the way they used to
  • Biometric data: security and ease negate passwords, but is it private?
  • Data security mistakes to avoid at all costs
  • Social Media Posts Now Fair Game in Security Clearance Process
  • Security through the entire life cycle
  • How to protect your business from 5 big data security threats
  • Report: Security and Privacy Fears Can Affect Internet Use
  • Industry Associations Publish Principles on International Cyber Security, Data & Technology
  • Mobile Security Challenges: You’re Not Alone
  • Mobile security updates are a mess. The FCC and FTC want to know why.
  • Almost half of companies don’t teach staff data security
  • When Twitter Cut Off The US Intelligence Community: Social Media And Surveillance
  • Social Media Crisis Management: How to Prepare and Execute a Plan
  • 9 Important Elements to Corporate Data Security Policies that Protect Data Privacy
  • Social Media: Things You Might Not Have Thought About
  • Russian Hacker Trades Millions of Stolen Records for Social Media Likes
  • 7 Password Experts on How to Lock Down Your Online Security
  • FFIEC Releases Guidance on Risk Management for Mobile Financial Services ‪http://ow.ly/ulPV3000Hk9 
  • We Tested 50+ Free Security Tools so You can Use Them for Your Online Protection
  • Warning issued over fake online ads for puppies and kittens
  • Rethinking security for the Internet of Things ‪http://ow.ly/m9VX3000H2t 
  • Continuing Data Security Lessons from the SEC | JD Supra
  • Five most common myths about Web security
  • Building the Case for Law Firm Data Security (Infographic)
  • Analytics, Predictive Insight and Agility Can Stop Data Breaches Before They Begin
  • IoUC’s Monthly Recap (Apr. 2016) – Stories Relating to the Internet of Unintended Consequences ‪http://ow.ly/4nnVV8 
  • Managing Online Risk’s Monthly Recap (Apr. 2016) – Stories Relating to Online Security & Risk
  • Law2sm Monthly Recap: Social Media & the Law 5/1/16 ‪http://ow.ly/4nnEU7 
  • Using Data To Secure Networks: Optimizing Individual Privacy While Achieving Strong Security ‪http://ow.ly/4nmB9Q 
  • Cybersecurity Insurance: Facing Hidden Risks and Uncertainty
  • Five Common Mobile App Security Vulnerabilities And How to Fix Them
  • Technology in Focus: Monetizing the Internet of Security Things ‪http://ow.ly/4nk7dA 
  • Craft a winning risk assessment analysis in five steps

Managing Online Risk’s Monthly Recap (Apr. 2016) – Stories Relating to Online Security & Risk

cloud-weather-tiny-app-icon_MkGqJALu_L

Welcome to our monthly recap of stories relating to Online Security and Risk. This month’s stories cover many issues including: data protection developments for the insurance & healthcare industries; 7 smart practices for smart devices; data security risks from a CISO perspective; EU passes data security laws; the 1st 24 hours of a security breach; and more.

These are some of the articles, reports, posts, etc. that caught our attention this week. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a weekly recap. The links will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.