Sage Advice - Cybersecurity Blog

4 Steps to a Privacy Initiative Roadmap

Digital privacy is an evolving, hot topic in the world right now. With the rise of ecommerce, digital marketing, online offers, and smart devices, it’s extremely difficult not to have your personal information – whether that be transactional information or information that defines you – out there. But what if we thought about it from the standpoint of your business? How can you make sure your organization is protecting individuals’ data and using best privacy practices? Let’s delve in to how you can create a privacy initiative roadmap for your organization.

Read More

Topics: Privacy

Privacy Regulations: What You Should Know

As consumers, our information is everywhere. With nearly everything connected to the web, it’s nearly impossible not to have your personal data out there. Because of this, privacy is a hot topic, now, more than ever. This means that entities must take precautions to protect the valuable data they have on you so that your personal data is not stolen.

Read More

Topics: Privacy

Why Does Privacy Matter?

Digital privacy is an evolving topic that is increasingly part of the cybersecurity discussion. Private information is transmitted in nearly every interaction of every day, from digital habits such as app and website usage, to purchases, to driving habits. Looking back at recent data breaches, it’s interesting that the largest breaches didn’t involve stolen credit card or social security numbers. Instead personal information is being stolen in large quantities. This private information is not only extremely valuable to us as individuals, but it’s becoming increasingly attractive for cybercriminals as well.

Read More

Topics: Privacy

The Danger of Stolen Usernames and Passwords: Credential Stuffing

The popular tax preparation software TurboTax recently announced that an unauthorized party had accessed an undisclosed number of its clients’ accounts. But it wasn’t because they had suffered a data breach. Instead they were victims of a credential stuffing attack – a cyberattack that continues to gain popularity. 

Read More

Topics: Cyber Defense, Privacy, Cybersecurity Awareness

Why Your Personal Data is Valuable – and How to Protect It

Looking back at recent data breaches, it’s interesting to note that the largest breaches didn’t involve stolen credit card or social security numbers. Instead a myriad of personal information is being stolen in massive quantities. Why this shift? It’s just more valuable!

Read More

Topics: Threat Intelligence, Risk Management, Privacy

Automation, Algorithms and AI — Oh My

Futurist, author, and consultant Mike Walsh spends 300-some-odd days a year traveling the globe researching technology trends, keynoting industry events, and guiding organizational leaders through the complexities of digital disruption. Appropriately, then, his 2018 CyberCrime Symposium presentation took attendees on a whirlwind tour of the transformative forces they’ll manage if they want to thrive in an increasingly AI-driven world. As he told the info-sec and privacy officers in attendance, the goalposts that marked 2020 as AI’s future zone have been pushed back a decade or so, but he warned them not to get complacent.

Read More

Topics: CyberCrime Symposium, IoT, Privacy

Face It: Cameras are Everywhere

Christopher Pierson thinks facial recognition, as both a topic and a biometric, is “super cool,” and that enthusiasm energized his 2018 CyberCrime Symposium session, “The Privacy and Security Implications of Facial Recognition.” But because he’s worn so many professional hats — from inventor, CISO, CPO, and general counsel, to member of DHS’s Data Privacy and Integrity Advisory Committee and its Cybersecurity Subcommittee — he could exult in facial scanning technology’s cool factor while laying out some of the growing legal, ethical, and privacy concerns surrounding it. 

Read More

Topics: CyberCrime Symposium, Privacy

Privacy, Cybersecurity, and the Nation’s Central Bank

People will defend their right to privacy to the end. Yet, they love their technology and so willingly share personal information online that they’re part of a coalition of malicious and legitimate cyber-actors that threaten it. Nevertheless, with legal ramifications growing, CISOs must now secure personally identifiable information (PII) and intellectual property (IP) while protecting its owner’s privacy.

Read More

Topics: CyberCrime Symposium, Financial Sector, Privacy

Cybersecurity Awareness in the Workplace: Building a Cyber-Family

It’s a connected world, fueled by a connected workforce whose organizations live and die by their data. Now that they can plug-in from any device, traverse cyber-space, and communicate via email, IM, or VoIP, older employees forget they haven’t always worked this way. But Phil Bickford contends that the current digital age — marked by the mainstream adoption of technology, emerging social media, and mobility — is only around 15 years old. How mature, then, can workplace cybersecurity awareness be?

Read More

Topics: CyberCrime Symposium, Cybersecurity Culture, Privacy

Privacy’s Conflicting Interests

Strong cybersecurity programs tightly control financial assets, but more and more, it’s information that’s the target of various bad actors around the world. A lot of this data falls into the privacy realm and under the protection of privacy laws. As new laws like the EU’s General Data Protection Regulation (GDPR) expand these protections, they’re colliding with equally important but often-conflicting national security and crime-fighting interests, according to Lawrence Dietz, founder of DataPrivacyLaw.com.

Read More

Topics: CyberCrime Symposium, Privacy