Business booms on other people’s bad luck

Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInEmail this to someonePrint this page

With some 32 mil­lion users report­ed­ly exposed, the hack of “the most famous name in infi­deli­ty” is bad for Ash­ley Madi­son, bad for its users, and unde­ni­ably awful for their spous­es. But at pri­vate inves­ti­ga­tion start­up Trusti­fy, busi­ness is boom­ing. The com­pa­ny has cap­i­tal­ized on the sit­u­a­tion by launch­ing a ser­vice that lets any­one search the data dump of Ash­ley Madi­son log-ins while tout­ing its PI wares to those who are con­cerned by a name they’ve found on the list. “Find the truth,” the com­pa­ny home page says. “Get peace of mind.” “We’re in the busi­ness of find­ing truth,” CEO Dan­ny Boice said. “We don’t have a posi­tion on that truth; there’s no bias. We don’t help any­one cov­er it up, and we won’t help any­one take actions once they find the truth.” Source: Wired

He knows of which he speaks

sh_frank abagnale_400Frank Abag­nale, an expert on iden­ti­ty theft and fraud schemes, has been named AARP Fraud Watch Net­work Ambas­sador. He’ll work with the Fraud Watch Net­work to pro­vide online pro­grams and com­mu­ni­ty forums to edu­cate con­sumers about ways to pro­tect them­selves from iden­ti­ty theft and cyber crime. “Our tech­nol­o­gy today seem­ing­ly has made it eas­i­er for the scam artists. There is a new vic­tim of iden­ti­ty theft every two sec­onds in the Unit­ed States,” said Nan­cy Lea­Mond, AARP’s chief advo­ca­cy and engage­ment offi­cer. “Frank Abagnale’s guid­ance as AARP Fraud Watch Net­work Ambas­sador will be high­ly effec­tive in edu­cat­ing our mem­bers and the pub­lic about ways to pro­tect them­selves and their fam­i­lies from fraud.” Source: PRNewswire

We’ll grow our own

The Nation­al Sci­ence Foun­da­tion has award­ed New York’s Pace Uni­ver­si­ty a $2.5 mil­lion grant to train cyber­se­cu­ri­ty pro­fes­sion­als. The five-year grant will direct­ly sup­port three to four stu­dents per year, as well as con­tribute to out­reach pro­grams and stu­dent research. The grant is an exten­sion of the Cyber­Corps pro­gram, which received $1 mil­lion from the NSF over the past five years. In 2014, gov­ern­ment and pri­vate-sec­tor employ­ers report­ed that less than 25 per­cent of appli­cants for cyber­se­cu­ri­ty posi­tions were qual­i­fied, accord­ing to a sur­vey by IT gov­er­nance trade group ISACA. Fund­ing for cyber­se­cu­ri­ty train­ing has enjoyed strong con­gres­sion­al sup­port, espe­cial­ly fol­low­ing hacks on the Office of Per­son­nel Man­age­ment, the IRS and com­pa­nies such as Anthem and Tar­get. “Cyber­se­cu­ri­ty has become an issue that affects mil­lions of Amer­i­cans, as well as our crit­i­cal infra­struc­ture and nation­al secu­ri­ty,” said Sen. Charles Schumer, D-N.Y., who announced the grant. Source: The Hill

Tech talks, maybe too much

sh_cybersecurity_280Tech­nol­o­gy can be great, but there is a down­side, says for­mer FBI Futur­ist-in-Res­i­dence Marc Good­man. “We need to be aware of those risks.” Good­man, author of Future Crimes, is refer­ring to the inher­ent dan­ger in the Inter­net of Things—putting more infor­ma­tion online, but not tak­ing addi­tion­al steps to pro­tect it. “We face an exis­ten­tial threat today from the tech­no­log­i­cal tools in our lives being used against us, par­tic­u­lar­ly attacks against crit­i­cal infrastructures—everything from finan­cial ser­vices to the elec­tri­cal grid itself,” Good­man says. “If you’re a cor­po­ra­tion like Gen­er­al Elec­tric and you have north of 100,000 employ­ees, every point on every employee’s lap­top, phone, serv­er, email account … needs to be locked down. It’s a near-impos­si­ble task. But (attack­ers) only need to find one way in, and they’re going for the low­est-hang­ing fruit.” Accord­ing to a 2014 IBM secu­ri­ty report, 95 per­cent of all cyber attacks were due to human error—preventable slip-ups such as click­ing on mal­ware links. Source: Pub­lic Radio International

Check them out

Cybrary, a no-cost cyber­se­cu­ri­ty mas­sive open online course (MOOC) provider, secured $400,000 in seed fund­ing via Inner Loop Cap­i­tal and New Stack Ven­tures. This mon­ey will be used to increase Cybrary’s expo­sure, fos­ter com­mu­ni­ty growth, and devel­op addi­tion­al course con­tent. Cybrary’s mis­sion is to pro­vide com­pre­hen­sive IT and cyber­se­cu­ri­ty train­ing options for under­served and dis­ad­van­taged peo­ple seek­ing to break into cyber­se­cu­ri­ty or move ahead in their cur­rent jobs. “Our vision is to make Cybrary the largest and most influ­en­tial online cyber­se­cu­ri­ty com­mu­ni­ty. One that is fueled by free learn­ing and a robust job and resumé mar­ket for tack­ling the indus­try skills and tal­ent gap,” said Ryan Corey, co-founder of Cybrary. Source: Dark Read­ing

In bad health

sh_health care breach_280Eighty-one per­cent of health care exec­u­tives say their orga­ni­za­tions have been com­pro­mised by at least one mal­ware, bot­net, or oth­er cyber attack dur­ing the past two years, and only half feel that they are ade­quate­ly pre­pared in pre­vent­ing attacks, says KPMG’s 2015 Health­care Cyber­se­cu­ri­ty Sur­vey. The study also found that the num­ber of attacks was increas­ing, with 13 per­cent say­ing they are tar­get­ed by exter­nal hack attempts about once a day, and anoth­er 12 per­cent see­ing about two or more attacks per week. More con­cern­ing, 16 per­cent of health care orga­ni­za­tions said they can­not detect in real-time whether their sys­tems are com­pro­mised. “The vul­ner­a­bil­i­ty of patient data at the nation’s health plans and approx­i­mate­ly 5,000 hos­pi­tals is on the rise, and health care exec­u­tives are strug­gling to safe­guard patient records,” said Michael Ebert, leader in KPMG’s Health­care & Life Sci­ences Cyber Prac­tice. Source: PRNewswire

Don’t be too smug; next time, it might be you

sh_privacy_280When a person’s con­fi­den­tial data is exposed in vio­la­tion of a legit­i­mate expec­ta­tion of pri­va­cy, it shouldn’t mat­ter whether that per­son is a saint or a sin­ner. A pri­va­cy inva­sion is a pri­va­cy inva­sion. The Ash­ley Madi­son hack is a fed­er­al and state crime. Post­ing indi­vid­u­als’ finan­cial data and con­tact infor­ma­tion may con­sti­tute the crime of aid­ing and abet­ting iden­ti­ty theft. Fed­er­al and state law enforce­ment should work on find­ing and pros­e­cut­ing the hack­ers. But even if we assume for the sake of argu­ment that every last name belongs to a cheater who vio­lat­ed his or her wed­ding vows, in the eyes of the law, their pri­va­cy is as deserv­ing of pro­tec­tion as any­one else’s. Today, it’s a data­base of alleged adul­ter­ers. Tomor­row, it could be the per­son­al infor­ma­tion of donors to an abor­tion rights or pro-life char­i­ty, or hos­pi­tal records, or even Google search his­to­ries. Source: The New York Dai­ly News

Listen to the experts, live

FBI Spe­cial Agent Byron Franz will dis­cuss cyber­se­cu­ri­ty for busi­ness­es at a ses­sion of the Green Bay Pack­ers Men­tor-Pro­tege Pro­gram dur­ing a ses­sion on Sept. 17 in the Lam­beau Field Atri­um. The event is open to all area busi­ness­es. Franz will sug­gest best prac­tices for detec­tion and mit­i­ga­tion of mali­cious insid­ers and cyber intru­sion actors who tar­get cor­po­rate com­put­er net­works and portable elec­tron­ic devices. He’ll also talk about the impor­tance of pub­lic-pri­vate part­ner­ships in com­bat­ing threats. … Becom­ing more informed about cyber risks is an impor­tant first step in arm­ing your busi­ness. Senior Vice Pres­i­dent of Enter­prise Risk Man­age­ment and Prin­ci­pal Dan Hous­ton of EPIC Insur­ance Bro­kers and Con­sul­tants will talk about how to do that at the CFO Risk Man­age­ment Sum­mit at the Sea­port World Trade Cen­ter in Boston on Sept. 11. His pre­sen­ta­tion, “Cyber, Tech­nol­o­gy, Media and Pri­va­cy Risk Man­age­ment and Insur­ance” will pro­vide insights into: how to pro­tect your busi­ness from cyber, tech­nol­o­gy, media and pri­va­cy risks; meth­ods of attack; rel­e­vant fed­er­al and state laws; the FBI’s role in cyber crime; how to pro­tect your orga­ni­za­tion from these risks; and what to do if a data breach hap­pens to you. Sources: Green Bay (Wis.) Press Gazette; Send2Press Newswire