Business booms on other people’s bad luck

Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInEmail this to someonePrint this page

With some 32 million users reportedly exposed, the hack of “the most famous name in infidelity” is bad for Ashley Madison, bad for its users, and undeniably awful for their spouses. But at private investigation startup Trustify, business is booming. The company has capitalized on the situation by launching a service that lets anyone search the data dump of Ashley Madison log-ins while touting its PI wares to those who are concerned by a name they’ve found on the list. “Find the truth,” the company home page says. “Get peace of mind.” “We’re in the business of finding truth,” CEO Danny Boice said. “We don’t have a position on that truth; there’s no bias. We don’t help anyone cover it up, and we won’t help anyone take actions once they find the truth.” Source: Wired

He knows of which he speaks

sh_frank abagnale_400Frank Abagnale, an expert on identity theft and fraud schemes, has been named AARP Fraud Watch Network Ambassador. He’ll work with the Fraud Watch Network to provide online programs and community forums to educate consumers about ways to protect themselves from identity theft and cyber crime. “Our technology today seemingly has made it easier for the scam artists. There is a new victim of identity theft every two seconds in the United States,” said Nancy LeaMond, AARP’s chief advocacy and engagement officer. “Frank Abagnale’s guidance as AARP Fraud Watch Network Ambassador will be highly effective in educating our members and the public about ways to protect themselves and their families from fraud.” Source: PRNewswire

We’ll grow our own

The National Science Foundation has awarded New York’s Pace University a $2.5 million grant to train cybersecurity professionals. The five-year grant will directly support three to four students per year, as well as contribute to outreach programs and student research. The grant is an extension of the CyberCorps program, which received $1 million from the NSF over the past five years. In 2014, government and private-sector employers reported that less than 25 percent of applicants for cybersecurity positions were qualified, according to a survey by IT governance trade group ISACA. Funding for cybersecurity training has enjoyed strong congressional support, especially following hacks on the Office of Personnel Management, the IRS and companies such as Anthem and Target. “Cybersecurity has become an issue that affects millions of Americans, as well as our critical infrastructure and national security,” said Sen. Charles Schumer, D-N.Y., who announced the grant. Source: The Hill

Tech talks, maybe too much

sh_cybersecurity_280Technology can be great, but there is a downside, says former FBI Futurist-in-Residence Marc Goodman. “We need to be aware of those risks.” Goodman, author of Future Crimes, is referring to the inherent danger in the Internet of Things—putting more information online, but not taking additional steps to protect it. “We face an existential threat today from the technological tools in our lives being used against us, particularly attacks against critical infrastructures—everything from financial services to the electrical grid itself,” Goodman says. “If you’re a corporation like General Electric and you have north of 100,000 employees, every point on every employee’s laptop, phone, server, email account … needs to be locked down. It’s a near-impossible task. But (attackers) only need to find one way in, and they’re going for the lowest-hanging fruit.” According to a 2014 IBM security report, 95 percent of all cyber attacks were due to human error—preventable slip-ups such as clicking on malware links. Source: Public Radio International

Check them out

Cybrary, a no-cost cybersecurity massive open online course (MOOC) provider, secured $400,000 in seed funding via Inner Loop Capital and New Stack Ventures. This money will be used to increase Cybrary’s exposure, foster community growth, and develop additional course content. Cybrary’s mission is to provide comprehensive IT and cybersecurity training options for underserved and disadvantaged people seeking to break into cybersecurity or move ahead in their current jobs. “Our vision is to make Cybrary the largest and most influential online cybersecurity community. One that is fueled by free learning and a robust job and resumé market for tackling the industry skills and talent gap,” said Ryan Corey, co-founder of Cybrary. Source: Dark Reading

In bad health

sh_health care breach_280Eighty-one percent of health care executives say their organizations have been compromised by at least one malware, botnet, or other cyber attack during the past two years, and only half feel that they are adequately prepared in preventing attacks, says KPMG’s 2015 Healthcare Cybersecurity Survey. The study also found that the number of attacks was increasing, with 13 percent saying they are targeted by external hack attempts about once a day, and another 12 percent seeing about two or more attacks per week. More concerning, 16 percent of health care organizations said they cannot detect in real-time whether their systems are compromised. “The vulnerability of patient data at the nation’s health plans and approximately 5,000 hospitals is on the rise, and health care executives are struggling to safeguard patient records,” said Michael Ebert, leader in KPMG’s Healthcare & Life Sciences Cyber Practice. Source: PRNewswire

Don’t be too smug; next time, it might be you

sh_privacy_280When a person’s confidential data is exposed in violation of a legitimate expectation of privacy, it shouldn’t matter whether that person is a saint or a sinner. A privacy invasion is a privacy invasion. The Ashley Madison hack is a federal and state crime. Posting individuals’ financial data and contact information may constitute the crime of aiding and abetting identity theft. Federal and state law enforcement should work on finding and prosecuting the hackers. But even if we assume for the sake of argument that every last name belongs to a cheater who violated his or her wedding vows, in the eyes of the law, their privacy is as deserving of protection as anyone else’s. Today, it’s a database of alleged adulterers. Tomorrow, it could be the personal information of donors to an abortion rights or pro-life charity, or hospital records, or even Google search histories. Source: The New York Daily News

Listen to the experts, live

FBI Special Agent Byron Franz will discuss cybersecurity for businesses at a session of the Green Bay Packers Mentor-Protege Program during a session on Sept. 17 in the Lambeau Field Atrium. The event is open to all area businesses. Franz will suggest best practices for detection and mitigation of malicious insiders and cyber intrusion actors who target corporate computer networks and portable electronic devices. He’ll also talk about the importance of public-private partnerships in combating threats. … Becoming more informed about cyber risks is an important first step in arming your business. Senior Vice President of Enterprise Risk Management and Principal Dan Houston of EPIC Insurance Brokers and Consultants will talk about how to do that at the CFO Risk Management Summit at the Seaport World Trade Center in Boston on Sept. 11. His presentation, “Cyber, Technology, Media and Privacy Risk Management and Insurance” will provide insights into: how to protect your business from cyber, technology, media and privacy risks; methods of attack; relevant federal and state laws; the FBI’s role in cyber crime; how to protect your organization from these risks; and what to do if a data breach happens to you. Sources: Green Bay (Wis.) Press Gazette; Send2Press Newswire