Skip to main content

Privacy Monday - April 13, 2015

PrivacyMonday_ImageSpring has finally arrived on the East Coast, and not a moment too soon.

Here are 3 privacy & security bits and bytes to start your week.

ICYMI - 60 Minutes' Steve Krofft Story on Why the Sony Hack is Important

Fascinating piece by a reporter who has been looking at cybersecurity/cyberwarfare issues for 15 years.  "You don't have to be a superpower to inflict damage on US corporations...."  Watch the entire story here.  (Full disclosure - Mintz client Cylance is prominently featured in this story.)

 

As a Follow-on:  New RSA Breach Readiness Survey Finds Majority Not Prepared

Now that you have seen the 60 Minutes eyeopener, read the latest study released by RSA, The Security Division of EMC, just ahead of next week's RSA Conference in San Francisco.   The opening few lines preview the content of Failures of the Security Industry: Accountability and Action Plan:

The information security industry is losing the cyberwar.  Make that cyberwars.  Plural.  Black hat "hactivists," organized crims syndicates, state-sponsored operatives, terrorists, and other threat actors attack computer systems and critical infrastructure on multiple fronts across the globe with seeming impunity....Cybercrime hurts the global economy.

Download the white paper here.

This is one you have to see - IT Governance, a UK consultancy, has a blog post with pictures -- screen shots from live TV broadcasts that leaked passwords.  Including one from the Super Bowl:  a live shot showing the credentials for the stadium's wireless network.   Take a look at the article and pictures here.

 

 

 

Subscribe To Viewpoints

Author

Cynthia J. Larose

Member / Co-Chair, Privacy & Cybersecurity Practice

Cynthia J. Larose is Chair of the firm's Privacy & Cybersecurity Practice, a Certified Information Privacy Professional-US (CIPP-US), and a Certified Information Privacy Professional-Europe (CIPP-E). She works with clients in various industries to develop comprehensive information security programs on the front end, and provides timely counsel when it becomes necessary to respond to a data breach.