Entries by Robert Siciliano

Your Customers’ High Cost of Privacy

This writer has said numerous times that privacy is waning and dying. Partly because we have allowed it with our bazillion posts to social and partly because of the shift from print advertising to digital. During that shift, lots of creative types figured out how to figure you out and get inside your digital head.…

15 tips to Protect your Digital Life

How much of “you” is stored inside your smartphone? For some of you, the answer will be “My entire life.” And that’s practically true. For many, all sorts of highly private, sensitive information, including photos, are stored in that little device called a smartphone. But here is a better question: Did you know that “you”…

Leaky WiFi leaks App data

Recently a settlement was obtained between 2 companies with the FTC. The charge was that these organizations failed to secure their mobile apps, which put consumer’s private data at risk. The FTC says that these companies disabled the SSL certificate validation. This default process confirms that an application’s communications are secure. Because the SSL was…

USB Drives – With Convenience Comes Risk

I’m sure most of us have used a USB drive (or thumb drive) at one point or another. They are super convenient to transfer files, especially when they are too large for email or you don’t have access to an Internet connection. But it’s this same convenience of being portable, readily available, and inexpensive that…

Study Shows Businesses not prepared for Attacks

Amazing: With the proliferation of cyber attacks globally, most businesses are ill-prepared to deal with this, says research from the Economist Intelligence Unit and Arbor Networks. Perhaps businesses have an “It won’t happen to us” mindset, even though hackers steal the most sensitive data, force the company to make enormous payments to fix the situation,…

How to store Water for long term Survival

Here’s what everyone should know about how to efficiently store water to be prepared for a catastrophe. Ever thought about the possibility that your water service could cease in the event of some kind of catastrophe? Would you have enough for your children to drink for a week? If you live in the Southwest, what…

What is a Man-in-the-Middle Attack?

There’s a reason why most people feel uncomfortable about the idea of someone eavesdropping on them—the eavesdropper could possibly overhear sensitive or private information. This is exactly the risk that computer users face with a common threat called a “Man-in-the-Middle” (MITM) attack, where an attacker uses technological tools, such as malware, to intercept the information…

How to Respond in an active Shooter Scenario

Here’s how to respond if a shooting breaks out. There’s no such thing as a perfect world in which guns and bullets don’t exist. Would you know what to do in the event of an unexpected shooting situation? The first thing you should do in a shooting crisis is to remain calm, even though your…

Risk Reduction: #1 Concern of Bank Boards

The Bank Director’s 2014 Risk Practices Survey reveals some very interesting information about the risk management programs that bank boards have in place. It’s classically challenging for many banks to assess how risk management practices affect the institution. However, banks that have worked at measuring the impact of a risk management program report favorable outcomes…