 |
|
Another Successful Data Privacy Day in the Books!
For the 8th consecutive year, we successfully secured the proclamation of Jan. 28 as Iowa Data Privacy Day. Planned to coincide with International Data Privacy Day (also on Jan. 28), the proclamation was our way of bringing greater awareness to the importance of privacy and protecting personal information.
We also successfully launched a new cloud-based risk management and compliance solution, SIMBUS360, to coincide with this important day. You can learn more about it here, and I'd be more than thrilled to provide you a demo of our compliance solution. We built SIMBUS360 for use by all industries. Heathcare, insurance and financial services and other industry security professionals have already shared their early impressions with us, and we've been overwhelmed by the incredibly positive response.
IN THIS ISSUE
|
|
|
Celebrating Iowa Data Privacy Day proclamation with Governor Terry Bradstad
|
|
INFOGRAPHIC: Your Health Data, Available for the Taking
|
|
Please share widely to educate more patients, caregivers
and
medical device engineers!
Heath and medical data are under siege, and many patients are completely unaware. To change that, we developed this infographic detailing what can happen to our most private data when not properly protected.
Please share this far and wide - more people should be asking tough questions of their doctors and caregivers!
|
|
 How to Spot a Fake
|
|
Con artists continue to woo unsuspecting victims into traps
Fraudsters are getting better, folks. Their attempts at persuading victims are so successful because they look so real. Read below before you open emails, attachments, or heaven forbid, your front door, to these criminals.
|
|
Hacking is Not a 'Left' or 'Right' Issue
|
|
It's time to evolve the conversation beyond political bickering
In the U.S., there has been a lot of debate about the vulnerability of our systems - our election systems in particular. While the increased conversation is much-needed and welcomed, it's disappointing to see the real issue buried under a veil of political mud-slinging.
I believe, as do many of my data privacy and security colleagues, that national cyber security is not a left or right issue.
Countries hack each other. It's been proven. It's time to stop debating that fact and to move the conversation toward how we are going to protect ourselves from the bad actors. (I recently talked about the long history of countries hacking on CWIowa Live.)
With such a wide range of motivations to break into and steal from sensitive data repositories and connected systems, the dialogue should be less about
whether there is hacking and more about
how it's occurring. Only then can we get to the real meat of the conversation - which is how to strengthen the digital infrastructures of our countries.
|
|
Good Technology in Bad Hands
|
|
Innovation in auto industry threatens security for vehicle owners, renters
It works by intercepting the signal from a key fob nearby, which some drivers have gotten into the habit of leaving in their cars (Do not do this!). When researchers tested the devices - after catching criminals on security footage doing the same - they were able to break into 19 out of the 35 cars they tried. Scarier yet, they were able to start and drive off in 18 of them!
- Keep keys in a metal box or a wallet protected from radio-frequency ID chips
- Park your car in a locked garage or well-lit place with surveillance cameras
|
|
Simple Protection for Smart Homes
|
|
Internet of Things (IoT) castles warrant digital moat
The popularity of connected devices for the home is creating a need for easy and affordable defense systems. And this year's Consumer Electronics Show brought exactly that. (Thank you, Christina A, for the pointer!)
Three organizations announced devices that promise to inspect data as it moves throughout a connected home's network. As a value add, the devices also come with parental controls to monitor the screen, device and gadget time of children.
Each of the devices works in concert with a connected home's router, the entry point for home networks, and will be managed through a smartphone app.
Love to see this kind of innovation and attention to home security!
|
|
| | | | |