Posts filed under:News

When fraud causes slack-jaw syndrome

Over the course of the last few days, my family and I have been screaming at the TV as the despicable case of alleged welfare fraud conducted by David Silverstein and his spouse, Lyudmila Shiminova. In this time of economic uncertain, high unemployment […]

By: | News| Tags: | Comments: Comments Off on When fraud causes slack-jaw syndrome

Unintended Consequences – Time for a paradigm shift

On 2 November, I gave a talk, “Unintended Consequences” at Gnomedex. I spoke to the need to recognize that “always-on” isn’t necessarily always good. I went on to describe the train-wrecks which occur when technology which is created for good, is used in a manner, unintended. I then shared the stories of 36 young people who we lost in 2010 due to being overwhelmed, both online and off.

A discussion surrounding bullying

I had the pleasure of speaking with Chris Pirillo pre-Gnomedex about a variety of subjects, some light, some humorous and one very serious – the topic of bullying and the attendant suicides. During this discussion, I also shared my thoughts on how we as a collective society need to step up and accomplish in the immediate future. I do hope you will come and listen to my talk on the Gnomedex stage at Seattle Interactive conference on 2 November 2011 at 1400 hours (2:00pm).

The presentation is titled: “Unintended Consequences”

Encrypt or not to encrypt, that is the question

17 October 2011 (#NCSAM – National Cyber Security Awareness Month) Encryption: To encrypt or not encrypt, that is the question (a hat tip to the Bard of Avon). In this day and age of digital data thefts, careless loss of […]

Wi-Fi: Three steps to stay safe when connecting via wireless

Those who have followed my writing on the subject of Wi-Fi security know my passion for taking seemingly basic steps to keep one’s wireless activity safe and secure. In a recent survey conducted by the Wi-Fi Alliance 86% of all respondents had taken the appropriate steps to secure their routers, but only 56% had taken the step to create a “hard” password, thus making themselves vulnerable to dictionary attacks or the like.
So take three basic steps to keep yourself Wi-Fi secure:

SMISH smash, don’t let your accounts take a Phish bath

What’s SMISH? SMISH is Short Message Service (SMS) Phish or in the lexicon of the day, Text Message Phishing. What’s phishing? Phishing is a criminal action where you are engaged by a third-party with the specific goal of you providing private and sensitive information for nefarious purposes. The difference between SMISH (SMS Phish) and Email Phish (Phish) is only the avenue by which you are engaged by the criminal.
How does it work?

Mobile – Daily risks mitigated

If you don’t maintain the health of your device then you should expect that your device will at some point in the future become compromised in some way, shape or form.
What type of compromises may occur? How often? What can you do?
Let’s answer these in order…

Game On! Eight tips to stay safe while playing online games

Do you or your children participate in online gaming, using your PC, smart phone or game box? Then you need to make sure you understand what’s going on, especially behind the curtain, when you configure your “game” settings. Here are eight online security tips to keep you safe and secure.

Location, Location, Location

Location based services are here to stay, have great viability and absolutely increase the interaction between individuals and merchants, as well as serve to identify individuals with similar interest. Know that well intentioned services have a positive side, but also may also be used to your detriment. If you are satisfied with the answers to the questions in today’s post, then make your decision to share or not to share.

Cyber Security Awareness: Are you?

Today marks the start of National Cyber Security Awareness Month (NCSAM) in the United States. If you’re reading this piece you are on a social network and have a modicum of interest in your online security. Throughout the month (as I have for the past few years) I will be publishing snack size tips that you may wish to share (family, friends, colleagues, or whomever) so that all have a leg-up on keeping their online activities enjoyable, but also safe and secure.

Medical Device Security – Are your devices secure?

Many medical devices have telemetry requirements, which require patient data to be both present within the device’s resident memory and to be transmitted from the device to a monitoring or record-preservation device (hard drive or tape). During transmission, are the content or command/control sequences protected? Do they need to be? Unfortunately, yes. The data must be protected not only from a PHI-data disclosure perspective, but also from data corruption perspective.

Hunger is just plain ugly

This week I viewed a video (see below) surrounding the famine in eastern Africa and the millions of souls who are literally starving before the worlds eyes, a midst the lawlessness of Somalia and environs. The world’s response as been tepid at best, and in my opinion disgraceful. Aid and sufficient military presence to protect those bringing the aid and those receiving the aid should be pouring into the environs, but instead we see donated supplies backing up at ports and depots and not moving to the areas of need. So what happens? Those who need the aid start migrating toward where they believe food and water are present. They journey for days and weeks often times leaving family members dead on the road toward relief. This needs to change.

By: | Featured, News, Hunger| Tags: | Comments: Comments Off on Hunger is just plain ugly

Book Review: Off the Street

A few weeks ago I had the pleasure of meeting Detective Christopher Baughman of the Las Vegas Police Department in person and chatting with him about his book, “Off the Street.” (to be released September 2011). You see Detective Baughman is the lead for the Las Vegas PD’s Pandering Investigation Team, part of Las Vegas Vice, and his book details the team’s first case. His mild manner belays his internal fire to protect those who are unable to protect themselves. Our discussion ranged from technologies described in his book, to human trafficking situation in Las Vegas where literally hundreds of vulnerable children and adults are manipulated into the sex trade. I also asked his permission to share the review pre-publication, to which he agreed. Read more…

By: | Reviews, News, Human Trafficking| Tags: | Comments: 2

Patient Data: The Crown Jewels (Mayo Blog)

I have always been an advocate of protecting one’s personal information and privacy and was personally pleased when the HIPAA standards came into being, as this raised the tide for all medical care providers to a common level of information protection. Indeed doctors, dentists, insurers, health organizations, hospitals and clinics all moved to have their data handling and storage reviewed and certified as being HIPAA compliant.

Sadly, being compliant is not synonymous with being secure. According to the Privacy Rights Clearinghouse there have been more than 87 separate data breaches made public from January 1 – June 10, 2011, which in aggregate affected more than 5,000,000 individuals’ records. Let’s look at the variety of ways patient data were compromised and how every one of these losses was avoidable.

By: | Featured, News| Tags: | Comments: 6

Accountability – You own your actions

One of the side shows of the recent Casey Anthony trial was the behavior of one of the spectators: Matthew Bartlett, read the admonishment on the court room door and ignored it.  The admonishment in very large print said:  Any […]

By: | News| Tags: | Comments: 1

Book Review: It’s not who you know, it’s how you treat them

It’s not who you know, it’s how you treat them By Corinne A. Gregory Many of us remember our parents telling us of the Golden Rule – Treat unto others as you would have others treat unto you – this […]

By: | Reviews, News| Tags: | Comments: Comments Off on Book Review: It’s not who you know, it’s how you treat them

National Hunger Awareness Day

National Hunger Awareness Day came and went on 7 June 2011. Reflect back, did you do anything different that day? Many didn’t, some did. Let me highlight the efforts of some who came to may attention:

By: | Featured, News, Hunger| Tags: | Comments: Comments Off on National Hunger Awareness Day
  • TwitterBot-Names
  • TwitterBot-Names
  • Spam Bot User
  • Spam Bot User

Online Safety: Are bots in your twitter following?

Yesterday I had a an interesting sequence of events happen within my Twitter footprint that I had not seen previously. I had 11+ new followers, all who had over 100, some over 1000 followers. These new followers all arrived in my follower list in sequence over the course of the early morning. Each of these *individuals* had sent between 2-10 tweets, none of which were original content – all of them being RT (re-tweets) of pieces from trusted sources such as Mashable.

The Twitter handle/name had the format of “given name” + “3 to 5 random characters”. Click on the Figure-1 o the left to see all of these names which arrived in my follower list and you’ll understand the naming convention. Every single one of these names is a “bot” generated name.

read more…

Online Safety – HTTPS

Please make sure you are connecting via HTTPS (S=secure) and much better for YOU than the HTTP connection

By: | Safety & Security, News, Online Safety| Tags: | Comments: Comments Off on Online Safety – HTTPS
  • Anthony Wayne Hart
  • Kathy Lee Hart
  • Kathy Lee Hart

Parents Selling Their Children – Sexual Exploitation of Minors

There are days when you read a piece in the news and shake your head in disbelief. That was the case yesterday when I read of a couple (Anthony Wayne Hart, 47 and his wife Kathy Lee Hart, 43) indicteded in Madison County, Virginia on charges of “human traffiicking” of their daughters. The grand jury indictment read, “arranging for their 13 and 14-year-old daughters to provide companionship and affection to male individuals in exchange for money and goods …” The incidents took place between 10 October 2009 and 24 February 2011.

By: | News| Tags: | Comments: 3