Social Engineering and Challenge Questions

A recent security breach of Apple’s iCloud security resulted in a journalist’s data being wiped out on his MacBook, iPad, and iPhone. The breach was accomplished through some cleaver social engineering. For those unfamiliar with the term, social engineering is the practice of manipula...

Does your staff overshare your corporate private information

Watching the Olympics is a quadrennial event for me. There are sports I like to watch that never get any coverage except when the Olympics role around. This year for some reason I’ve started paying attention to the human interest stories featuring the athletes (something, as a guy, I am loa...

“And you’re sharing my fingerprints with….?”

It is not unusual for me to make assumptions about how my personal information will be treated based on my past experiences. With technology changing as quickly as it does this is probably a mistake. Reviewing a privacy policy or looking for a notice when new technology is introduced is a good id...

Legal requirements, policy & the right thing to do

Ever since I created my first social media account I have been asking myself who is responsible for protecting my privacy. I always come back to the same answer, “I am”. Ultimately, I choose who I provide information to, who I use my credit card with instead of cash, and what I post t...

Don’t ignore the basic good practices

My wife and I have spent the past few days traveling US 95. One night we stopped in a small town in South Carolina to spend the night at a national chain’s motel. With the expected southern hospitality, I received a wonderfully friendly reception from the person manning the motel’s de...

Announcing Privacy Ref

For the past several years I have been working for a Fortune 150 business, leading the enterprise-wide privacy program. I have been fortunate to have a great team working for me and we were able to build a successful program including achieving PCI DSS compliance and Safe Harbor certification for...
Quarterly Data Breach ReviewFree Webinar

Once a quarter, Benjamin Siegel reviews several recent breaches, discussing what happened and how it could have been prevented.

March 9th, 1:00 - 2:00 PM EST