Social Engineering and Challenge Questions

A recent security breach of Apple’s iCloud security resulted in a journalist’s data being wiped out on his MacBook, iPad, and iPhone. The breach was accomplished through some cleaver social engineering. For those unfamiliar with the term, social engineering is the practice of manipula...

Does your staff overshare your corporate private information

Watching the Olympics is a quadrennial event for me. There are sports I like to watch that never get any coverage except when the Olympics role around. This year for some reason I’ve started paying attention to the human interest stories featuring the athletes (something, as a guy, I am loa...

“And you’re sharing my fingerprints with….?”

It is not unusual for me to make assumptions about how my personal information will be treated based on my past experiences. With technology changing as quickly as it does this is probably a mistake. Reviewing a privacy policy or looking for a notice when new technology is introduced is a good id...

Legal requirements, policy & the right thing to do

Ever since I created my first social media account I have been asking myself who is responsible for protecting my privacy. I always come back to the same answer, “I am”. Ultimately, I choose who I provide information to, who I use my credit card with instead of cash, and what I post t...