Tuesday, March 31, 2015

2014 Endpoint Security Survey,

To adapt to the ever-changing threat landscape, IT and InfoSec professionals must make sound investments that aim to strengthen their security posture.



http://connect.guidancesoftware.com/LP=607?cmpid=Direct-GSI-Cybersecurity_NA-Q115_homepage-A-Eloqua_Landing_Page-The_Rise_of_Endpoint_Forensics-1-28-2015&utm_source=GSI&utm_medium=Direct&utm_campaign=1-28-2015-Cybersecurity_NA-Q115_homepage

Privacy and HIPAA - Practice Support | CDA (California Dental Association)

Privacy and HIPAA - Practice Support | CDA (California Dental Association): Dentists have until March 1 to report a HIPAA-compliance issue to the U.S. Department of Health and Human Services Office for Civil Rights (HHS).

Friday, March 27, 2015

The Hemingways: An American Tragedy | VQR Online

"Mayo Clinic badly botched Hemingway's treatment when he was admitted for depression and given two disastrous series of electroshock therapy in 1960—61, He had been frightened and depressed when told by a Cuban doctor in the summer of 1960 that he had hemochromatosis, a rare, chronic, and fatal form of diabetes "that makes you go blind and permanently impotent." The Mayo doctors also suspected that he had this disease, but they did not attempt to relieve his anxiety by doing a biopsy and making a definite diagnosis."

http://www.vqronline.org/essay/hemingways-american-tragedy

The Genographic Project on SciStarter

... a five-year anthropological study that uses DNA voluntarily contributed by hundreds of thousands of people to answer the oldest questions we have about ourselves: Who are we and where did we come from?

http://scistarter.com/project/94-The%20Genographic%20Project?tab=project

Thursday, March 26, 2015

Top 10 IRS Identity Theft Cases of 2014 | CPA Practice Advisor

Top 10 IRS Identity Theft Cases of 2014 | CPA Practice Advisor: “Our top 10 cases represent the seriousness of these crimes and the magnitude of the consequences that will be faced by those who victimize honest taxpayers and steal from hard-working Americans.”

Tuesday, March 24, 2015

IRS Releases Data Showing Impact of Budget Cuts

"Fiscal Year 2014 marked the fourth consecutive year IRS appropriations were reduced," said IRS Commissioner John Koskinen in a statement. "These reductions required us to change our approach to taxpayer service and enforcement operations; with fewer resources, we saw decreases in the number of phone calls answered and the number of audits completed."

http://www.accountingtoday.com/news/tax-practice/irs-releases-data-showing-impact-of-budget-cuts-74077-1.html

IRS Sending Letters to Verify Taxpayer Identities

IRS Sending Letters to Verify Taxpayer Identities:



"The Internal Revenue Service is sending letters to verify the identity of taxpayers as part of its effort this tax season to combat the growing problem of identity theft."



This is true.



'via Blog this'

Statistics about Business Size (including Small Business) from the U.S. Census Bureau

Statistics about Business Size (including Small Business) from the U.S. Census Bureau:



Employment Size of Firms
Table 2a. Employment Size of Employer and Nonemployer Firms, 2008

Target's Data Breach Deal Shows Strength Of Banks' Case - Law360

Target's Data Breach Deal Shows Strength Of Banks' Case - Law360:



Target Corp.'s $10 million settlement with consumers over the retailer's massive data breach suggests banks and credit unions that remain in the litigation with the company are in a stronger position to prove that the substantial costs they say they incurred replacing payment cards are directly linked to the intrusion, experts say.

Judge OKs $10 million settlement in Target data breach

Judge OKs $10 million settlement in Target data breach: A Minnesota judge has endorsed a settlement in which Target Corp. will pay $10 million to settle a class-action lawsuit over a massive data breach in 2013.

Judge rules that banks can sue Target for 2013 credit card hack | Ars Technica

Judge rules that banks can sue Target for 2013 credit card hack | Ars Technica: On Tuesday, a District Court judge in Minnesota ruled [PDF] that a group of banks can proceed to sue Target for negligence in the December 2013 breach that resulted in the theft of 40 million consumer credit card numbers as well as personal information on 70 million customers.

Target Missed Warning Signs Of Breach, Senate Report Says - Law360

Target Missed Warning Signs Of Breach, Senate Report Says - Law360: A report released by Sen. John D. Rockefeller’s office on Tuesday said Target Corp. failed to take advantage of warning signs to stop last year’s massive data breach in which hackers stole financial and personal information from as many as 110 million customers.

Monday, March 23, 2015

Friday, March 20, 2015

The age of instant architecture: Can a block of flats built in 48 hours really be safe? - Architecture - Arts and Entertainment - The Independent

Broad built a 15-storey hotel in its home city of Changsha in six days last year...

http://www.independent.co.uk/arts-entertainment/architecture/the-age-of-instant-architecture-can-a-block-of-flats-built-in-48-hours-really-be-safe-8483928.html


From My iPhone

Political Interference Hinders Cybersecurity Firms

The hesitance Kaspersky has shown with making the reports public could be an indicator of political influence.

http://www.inforocked.com/tech-news/163-political-interference-hinders-cybersecurity-firms


From My iPhone

Feds search for ways to impede 'cyber bazaar' | TheHill

"This is a high-end market in malware," said Hedi Nasheri, a criminology and justice studies professor at Kent State University who has studied the cyber crime world in Eastern Europe. "Basically they are professional guns for hire"

http://thehill.com/policy/cybersecurity/235726-feds-search-for-ways-to-impede-cyber-bazaar


From My iPhone

How to Protect Yourself Against 'Free WiFi' Scams - NBC News

How to Protect Yourself Against 'Free WiFi' Scams - NBC News:



2 minutes of free publicity on NBC.



With no evidence of cyber crime at all.



Security experts warn that cyber criminals are setting up fake WiFi hotspots, luring consumers to hand over the keys to their computers.

Free Live Video Streaming Online Broadcasts Hosting Packages

High Performance LIVE Video Streaming Hosting for IP Cameras – H264 – MJPEG  MPEG –compression protocols


From My iPhone

Monday, March 16, 2015

Sample Size Calculator - Confidence Level, Confidence Interval, Sample Size, Population Size, Relevant Population

Sample Size Calculator - Confidence Level, Confidence Interval, Sample Size, Population Size, Relevant Population - Creative Research Systems:



This Sample Size Calculator is presented as a public service of Creative Research Systems survey software. You can use it to determine how many people you need to interview in order to get results that reflect the target population as precisely as needed. You can also find the level of precision you have in an existing sample.

Journeys in Survey Research (Home page)

Journeys in Survey Research (Home page): a valuable and interesting resource for researchers, students and others doing, or learning about, survey research and the analysis of survey data.

Tuesday, March 10, 2015

Statistics about Business Size (including Small Business) from the U.S. Census Bureau

Statistics about Business Size (including Small Business) from the U.S. Census Bureau: "About three quarters of all U.S. business firms have no payroll. Most are self-employed persons operating unincorporated businesses, and may or may not be the owner's principal source of income. Because nonemployers account for only about 3.4 percent of business receipts, they are not included in most business statistics, for example, most reports from the Economic Census."



'via Blog this'

Friday, March 6, 2015

Tuesday, March 3, 2015

Reputation Damage - Risk Event or Risk Consequence? | Protecht

... July 2011, News Limited saw approximately $8 billion wiped off its shareholder value as the phone hacking scandal in the UK unfolded. The flow on effects of this scandal have been nothing short of extraordinary:

http://www.protecht.com.au/resources/articles/reputation-damage-risk-event-consequence

Monday, March 2, 2015

HIMSS Security Survey | Privacy & Security | HIMSS

.... the greatest "security threat motivator" they encounter is that of healthcare workers potentially snooping into the electronic health information of friends, neighbors, spouses or co-workers.

http://www.himss.org/ResourceLibrary/genResourceDetailPDF.aspx?ItemNumber=28270

What The Sony Hack Can Teach About Cyber Security - Forbes

A 2013 report from Pierre Audoin Consultants on behalf of the UK government's Department for Business Innovation and Skills (BIS) neatly describes how evolving use of the internet has created new vulnerabilities.

http://www.forbes.com/sites/freddiedawson/2015/02/27/what-the-sony-hack-can-teach-about-cyber-security/


From My iPhone

10 Notorious Cyber Criminals Brought to Justice - #1

Every day, information security professionals and law enforcement agencies are working to make cyberspace a safer place.

http://www.tripwire.com/state-of-security/government/10-notorious-cyber-criminals-brought-to-justice-1/?utm_source=twitterfeed&utm_medium=twitter&utm_campaign=information_security


From My iPhone

Sunday, March 1, 2015

grand stream dreams: Time to set up a CERT/CSIRT? Yes!

I have found these resources make an excellent starting point for gaining foundational understanding of what an effective CERT/CSIRT team looks like and the many ways it can be structured depending on the organization's needs/limitations.

http://grandstreamdreams.blogspot.com/2015/02/time-to-set-up-certcsirt-yes.html?utm_content=buffer09b9e&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer&m=1


From My iPhone