Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Tuesday, March 31, 2015
2014 Endpoint Security Survey,
http://connect.guidancesoftware.com/LP=607?cmpid=Direct-GSI-Cybersecurity_NA-Q115_homepage-A-Eloqua_Landing_Page-The_Rise_of_Endpoint_Forensics-1-28-2015&utm_source=GSI&utm_medium=Direct&utm_campaign=1-28-2015-Cybersecurity_NA-Q115_homepage
Privacy and HIPAA - Practice Support | CDA (California Dental Association)
Friday, March 27, 2015
The Hemingways: An American Tragedy | VQR Online
"Mayo Clinic badly botched Hemingway's treatment when he was admitted for depression and given two disastrous series of electroshock therapy in 1960—61, He had been frightened and depressed when told by a Cuban doctor in the summer of 1960 that he had hemochromatosis, a rare, chronic, and fatal form of diabetes "that makes you go blind and permanently impotent." The Mayo doctors also suspected that he had this disease, but they did not attempt to relieve his anxiety by doing a biopsy and making a definite diagnosis."
The Genographic Project on SciStarter
... a five-year anthropological study that uses DNA voluntarily contributed by hundreds of thousands of people to answer the oldest questions we have about ourselves: Who are we and where did we come from?
http://scistarter.com/project/94-The%20Genographic%20Project?tab=project
Thursday, March 26, 2015
Top 10 IRS Identity Theft Cases of 2014 | CPA Practice Advisor
Tuesday, March 24, 2015
IRS Releases Data Showing Impact of Budget Cuts
"Fiscal Year 2014 marked the fourth consecutive year IRS appropriations were reduced," said IRS Commissioner John Koskinen in a statement. "These reductions required us to change our approach to taxpayer service and enforcement operations; with fewer resources, we saw decreases in the number of phone calls answered and the number of audits completed."
IRS Sending Letters to Verify Taxpayer Identities
"The Internal Revenue Service is sending letters to verify the identity of taxpayers as part of its effort this tax season to combat the growing problem of identity theft."
This is true.
'via Blog this'
Statistics about Business Size (including Small Business) from the U.S. Census Bureau
Employment Size of Firms
Table 2a. Employment Size of Employer and Nonemployer Firms, 2008
Target's Data Breach Deal Shows Strength Of Banks' Case - Law360
Target Corp.'s $10 million settlement with consumers over the retailer's massive data breach suggests banks and credit unions that remain in the litigation with the company are in a stronger position to prove that the substantial costs they say they incurred replacing payment cards are directly linked to the intrusion, experts say.
Judge OKs $10 million settlement in Target data breach
Judge rules that banks can sue Target for 2013 credit card hack | Ars Technica
Target Missed Warning Signs Of Breach, Senate Report Says - Law360
Monday, March 23, 2015
Cyber-security: Good tech,bad tech | The Economist
Target ruling raises stakes for cybersecurity vigilance - CSMonitor.com
Sunday, March 22, 2015
STUDY: How the NSA’s Prism Initiative Affected Americans’ Social Media Use | SocialTimes
"a portion of the population is adjusting some activity at least in some simple ways, like changing their privacy settings and being a bit more discreet in the things they say and search for."
uk "information security breaches survey" - Google Search
https://www.google.com/search?q=uk+%22information+security+breaches+survey%22&ie=UTF-8&oe=UTF-8&hl=en&client=safari
From My iPhone
Saturday, March 21, 2015
In Australia, Your D.N.A. Can Now Be Privatized
Sample Size Calculator - Confidence Level, Confidence Interval, etc/
Friday, March 20, 2015
The age of instant architecture: Can a block of flats built in 48 hours really be safe? - Architecture - Arts and Entertainment - The Independent
http://www.independent.co.uk/arts-entertainment/architecture/the-age-of-instant-architecture-can-a-block-of-flats-built-in-48-hours-really-be-safe-8483928.html
From My iPhone
Political Interference Hinders Cybersecurity Firms
http://www.inforocked.com/tech-news/163-political-interference-hinders-cybersecurity-firms
From My iPhone
Feds search for ways to impede 'cyber bazaar' | TheHill
http://thehill.com/policy/cybersecurity/235726-feds-search-for-ways-to-impede-cyber-bazaar
From My iPhone
How to Protect Yourself Against 'Free WiFi' Scams - NBC News
2 minutes of free publicity on NBC.
With no evidence of cyber crime at all.
Security experts warn that cyber criminals are setting up fake WiFi hotspots, luring consumers to hand over the keys to their computers.
Free Live Video Streaming Online Broadcasts Hosting Packages
From My iPhone
Thursday, March 19, 2015
Anglia Ruskin University Library - Harvard System
Also: http://www.staffs.ac.uk/assets/harvard_quick_guide_tcm44-47797.pdf
Monday, March 16, 2015
Sample Size Calculator - Confidence Level, Confidence Interval, Sample Size, Population Size, Relevant Population
This Sample Size Calculator is presented as a public service of Creative Research Systems survey software. You can use it to determine how many people you need to interview in order to get results that reflect the target population as precisely as needed. You can also find the level of precision you have in an existing sample.
Journeys in Survey Research (Home page)
Tuesday, March 10, 2015
Statistics about Business Size (including Small Business) from the U.S. Census Bureau
'via Blog this'
Friday, March 6, 2015
subprime financial crisis banks - Google Search
http://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2156&context=faculty_publications
Tuesday, March 3, 2015
Reputation Damage - Risk Event or Risk Consequence? | Protecht
... July 2011, News Limited saw approximately $8 billion wiped off its shareholder value as the phone hacking scandal in the UK unfolded. The flow on effects of this scandal have been nothing short of extraordinary:
http://www.protecht.com.au/resources/articles/reputation-damage-risk-event-consequence
Monday, March 2, 2015
HIMSS Security Survey | Privacy & Security | HIMSS
.... the greatest "security threat motivator" they encounter is that of healthcare workers potentially snooping into the electronic health information of friends, neighbors, spouses or co-workers.
http://www.himss.org/ResourceLibrary/genResourceDetailPDF.aspx?ItemNumber=28270
What The Sony Hack Can Teach About Cyber Security - Forbes
http://www.forbes.com/sites/freddiedawson/2015/02/27/what-the-sony-hack-can-teach-about-cyber-security/
From My iPhone
10 Notorious Cyber Criminals Brought to Justice - #1
http://www.tripwire.com/state-of-security/government/10-notorious-cyber-criminals-brought-to-justice-1/?utm_source=twitterfeed&utm_medium=twitter&utm_campaign=information_security
From My iPhone
Sunday, March 1, 2015
grand stream dreams: Time to set up a CERT/CSIRT? Yes!
I have found these resources make an excellent starting point for gaining foundational understanding of what an effective CERT/CSIRT team looks like and the many ways it can be structured depending on the organization's needs/limitations.
http://grandstreamdreams.blogspot.com/2015/02/time-to-set-up-certcsirt-yes.html?utm_content=buffer09b9e&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer&m=1From My iPhone