Thursday, June 30, 2016

Cybersecurity and privacy | Digital Single Market

Cybersecurity and privacy | Digital Single Market: "trust and security are at the core of the Digital Single Market Strategy, launched in 2015, while the fight against cybercrime is one of the three pillars of the European Agenda on Security."

Wednesday, June 29, 2016

Mobile ransomware use jumps, blocking access to phones | Network World

Mobile ransomware use jumps, blocking access to phones | Network World: "Kaspersky customers in Germany, Canada, the U.K. and the U.S., in that order, were the top four countries affected by mobile ransomware."



'via Blog this'

The EU’s fight against cybercrime continues – attacks against information systems

"The EU’s fight against cybercrime continues – attacks against information systems | Herbert Smith Freehills – FSR notes: Today is the deadline for transposition into national law of the Directive on attacks against information systems (the “Directive“), which came into force on 24 August 2013. This Directive forms part of the EU’s continuing efforts to keep pace in its fight against the ever evolving nature of cybercrime, and in particular, the increasingly sophisticated and large-scale forms of attack against information systems. It updated (and replaced) minimum rules, established by the Council Framework Decision 2005/222/JHA (the “Framework Decision”), relating to the definition of relevant criminal offences and sanctions across Member States and the improved cooperation between competent authorities."

Monday, June 27, 2016

MoFo Brexit Alert PDF

160627BrexitData.pdf

Lit says...MoFo Brexit Alert PDF

Saturday, June 25, 2016

The Antivirus Industry’s Dirty Little Secret

The Antivirus Industry’s Dirty Little Secret: "having antivirus (end-point security if you will) creates a false sense of security. Yes, you need antivirus, but don't rely on it for 100% protection"



'via Blog this'

Friday, June 24, 2016

Don’t Let Cybercriminals Hide from the FBI

"The rest of the security world calls the NIT "malicious code" ("malcode" for short) and deploying it "hacking," because the software exploits a vulnerability in the target's computer, the same way a criminal would."

http://www.govtech.com/opinion/Dont-Let-Cybercriminals-Hide-from-the-FBI.html

Thursday, June 23, 2016

Work and Personality: Use of the NEO-PI-R

Work and Personality: Use of the NEO-PI-R in Industrial/Organisational
Psychology - Costa - 2008 - Applied Psychology - Wiley Online Library

http://onlinelibrary.wiley.com/doi/10.1111/j.1464-0597.1996.tb00766.x/abstract

Wednesday, June 22, 2016

Chapter 1: Section 1: Introduction To Personality Theory And Development | AllPsych

"A trait is a relatively permanent individual characteristic.  For example, most of know people who are outgoing, friendly, confident, or shy.  When we describe these people, we use these traits to better understand their personality; to better understand who they are.  A state, on the other hand, is a temporary change in one's personality.  Examples of states might be angry, depressed, fearful, or anxious.  We typically use states to describe a person's reaction to something."

http://allpsych.com/personalitysynopsis/intro/

Monday, June 20, 2016

Sync NI - Technology News, Business News in Belfast and Northern Ireland - The Evolution of Cloud

Sync NI - Technology News, Business News in Belfast and Northern Ireland - The Evolution of Cloud: 1990 British researcher, Tim Berners-Lee develops a new technique for distributing information on the internet, Hyper Text Markup Language, or HTML, which was eventually called the World Wide Web.

IEEE Xplore Abstract - Neural Markers of Cybersecurity: An fMRI Study of Phishing, and Malware Warnings

IEEE Xplore Abstract - Neural Markers of Cybersecurity: An fMRI Study of Phishing, and Malware Warnings: "The security of computer systems often relies upon decisions and actions of end users. In this paper, we set out to investigate users’ susceptibility to cybercriminal attacks by concentrating at the most fundamental component governing user behavior – the human brain."

Saturday, June 18, 2016

IEEE Xplore Abstract - Organisations Capability and Aptitude towards IT Security Governance

IEEE Xplore Abstract - Organisations Capability and Aptitude towards IT Security Governance: In today's more digitized world, the notion of Information Technology's (IT) delivery of value to businesses has been stretched to mitigation of broader organisations' risk.

Friday, June 17, 2016

(IT) Information Technology Webinars | CompTIA

(IT) Information Technology Webinars | CompTIA: "Our IT webinars feature an all-star roster of speakers from every corner of the IT industry."



'via Blog this'

Thursday, June 16, 2016

Short Personality Test - The Psychometrics Centre

Short Personality Test - The Psychometrics Centre: This test measures your BIG5 personality, one of the most popular scientific measures of personality.

Monday, June 13, 2016

HIPAA Gotcha Questions for Business Associates

HIPAA Gotcha Questions for Business Associates: "Getting a letter or email from an auditor, business partner or client requesting a written copy of your latest HIPAA risk assessment, policies and procedures, and documented staff training would qualify as an unexpected disconcerting challenge. Based on history many business associates can expect this in the near future."

Try VMware Workstation Player. Deliver a virtual desktop to your employees. | United States

Try VMware Workstation Player. Deliver a virtual desktop to your employees. | United States: VMware Workstation 12 Player provides a streamlined user interface for creating, running, and evaluating operating systems and applications in a virtual machine regardless of the operating system.

Healthcare Compliance Gotchas - InformationWeek

Healthcare Compliance Gotchas - InformationWeek: Doing the basics to comply with HIPAA and PCI isn’t always sufficient to keep data safe.

Five Gray Areas of HIPAA You Can’t Ignore | EMR and HIPAA

Five Gray Areas of HIPAA You Can’t Ignore | EMR and HIPAA: Unfortunately many organizations are practicing the “ignorance is bliss” approach to HIPAA compliance.

HIPAA Happenings -- The New HITECH Act Megarule

HIPAA Happenings -- The New HITECH Act Megarule: OCR still recognizes that there are situations where an unauthorized use, disclosure, access, or acquisition is very inconsequential and may not warrant notification.

Timeline of Important Events in the History of HIPAA - HIPAA Journal

Timeline of Important Events in the History of HIPAA - HIPAA Journal: The legislation was originally introduced during Bill Clinton’s tenure as president, and was originally intended to improve the portability and accountability of health insurance coverage.

Why Healthcare Ransomware Attacks Are HIPAA Data Breaches

Why Healthcare Ransomware Attacks Are HIPAA Data Breaches: Ransomware attacks need to be disclosed as unauthorized exposures of private information because they are every bit as dangerous as the outright theft of the laptop, desktop, or server that they infect.

Is Ransomware Considered A HIPAA Breach? |

Is Ransomware Considered A HIPAA Breach? |: Keep in mind that when HIPAA regulations were written no one was thinking about ransomware. In fact, the iPhone had not even been invented when the HIPAA Security Rule was published (yep HIPAA is that old!)

Is Ransomware Considered A Health Data Breach Under HIPAA? - Forbes

Is Ransomware Considered A Health Data Breach Under HIPAA? - Forbes: The fact is, ransomware does represent a new legal ambiguity to the federal legislation known as HIPAA, which was designed to protect patients against the loss, theft or breach of their protected health information (PHI).

Few Consequences For HIPAA Health Privacy Law's Repeat Offenders - ProPublica

Few Consequences For HIPAA Health Privacy Law's Repeat Offenders - ProPublica: Regulators have logged dozens, even hundreds, of complaints against some health providers for violating federal patient privacy law. Warnings are doled out privately, but sanctions are imposed only rarely. Companies say they take privacy seriously.

You can't do that in healthcare: 5 tips on staying true to HIPAA | Healthcare Dive

You can't do that in healthcare: 5 tips on staying true to HIPAA | Healthcare Dive: HIPAA makes it ethically difficult for physicians to respond to online reviews, even those that are specious or untrue.

Upset About Their Bad Yelp Reviews, Your Health Providers Are Spilling Patient Secrets — Pacific Standard

Upset About Their Bad Yelp Reviews, Your Health Providers Are Spilling Patient Secrets — Pacific Standard: Burned by negative reviews, some health providers are casting their patients’ privacy aside and sharing intimate details online as they try to rebut criticism.

Sunday, June 12, 2016

EROVR - A Transformable Dolly, Wagon, & Cart | Indiegogo

EROVR - A Transformable Dolly, Wagon, & Cart | Indiegogo:



The EROVR transforms 10 different ways to carry whatever life throws at you.

'Minnesota Men' on Trial

"Nur had commissioned him to kill 16 Americans supposedly responsible for airstrikes on ISIS in Kobane, Syria. ISIS had come up with the names and addresses of the pilots by hacking a military database. Omar complained this information was too "hot": He had accidentally clicked on the link to the names and addresses, making it possible for law enforcement to track him."

http://www.weeklystandard.com/minnesota-men-on-trial/article/2002781

Cyber risk as systemic risk | VOX, CEPR’s Policy Portal

Cyber risk as systemic risk | VOX, CEPR's Policy Portal

"The root cause of systemic crises is risk-taking behaviour of economic"

http://voxeu.org/article/cyber-risk-systemic-risk

10 ways law firms can make life difficult for hackers | Network World

10 ways law firms can make life difficult for hackers | Network World: "The Wall Street Journal reported recently that hackers broke into the networks of two of the nation’s most prestigious firms, Cravath Swaine & Moore and Weil Gotshal & Manges, in 2015. "



'via Blog this'

HIE Dispute with Vendor Spotlights Critical Security Issues

HIE Dispute with Vendor Spotlights Critical Security Issues: "A HIPAA-related legal dispute between a Chicago-area health information exchange organization and its key IT vendor, which is going out of business, spotlights several important privacy and security issues."



'via Blog this'

In Response...

In Response...: "A responsive HTML/CSS website template" that I quite like.

'via Blog this'

Psychological tests & quizzes — WordPress Plugins

Psychological tests & quizzes — WordPress Plugins: Create psychological tests/quizzes with scales connected with results through simple formulas like "extraversion > 50%"

Norms for the Big Five Inventory and other personality measures – The Hardest Science

Norms for the Big Five Inventory and other personality measures – The Hardest Science: For published scales that give normed scores, it often turns out to mean the 70th percentile of the distribution of people who somehow made it into the scale author’s convenience sample 20 years ago.

Calculating Scale Scores for Psychological Tests

Calculating Scale Scores for Psychological Tests: This post discusses how to calculate scale scores for multi-item scales.

Tuesday, June 7, 2016

Upset About Their Bad Yelp Reviews, Your Health Providers Are Spilling Patient Secrets — Pacific Standard

Upset About Their Bad Yelp Reviews, Your Health Providers Are Spilling Patient Secrets — Pacific Standard: But in trying to respond to critical ones, some doctors, dentists, and chiropractors appear to be violating the federal patient privacy law known as HIPAA.

Take a personality test

"this website provides a collection of interactive personality tests with detailed results that can be taken for personal entertainment or to learn more about personality assessment"

http://personality-testing.info/

Research Background and Frequently Asked Questions on the Big Five

Personality research, like any science, relies on quantifiable concrete data which can be used to examine what people are like. This is where the Big Five plays an important role.

http://www.outofservice.com/bigfive/info/

Monday, June 6, 2016

Upset About Their Bad Yelp Reviews, Your Health Providers Are Spilling Patient Secrets — Pacific Standard

Upset About Their Bad Yelp Reviews, Your Health Providers Are Spilling Patient Secrets — Pacific Standard: "n trying to respond to critical ones, some doctors, dentists, and chiropractors appear to be violating the federal patient privacy law known as HIPAA"



'via Blog this'

Single Group Correlational Study: Basic Analyses

Single Group Correlational Study: Basic Analyses: This post sets a basic procedure for analysing a single group observational study in psychology. It aims to provide a starting point, particularly for researchers who do analyse data infrequently.

Protecting Corporate Data... When an Employee Leaves

Protecting Corporate Data... When an Employee Leaves: When someone leaves the company, the HR department is quick to grab the employee’s laptop. But what about the data on other equipment?

Why Ex-Employees Might Just Be Your Company's Biggest Threat - Forbes

Why Ex-Employees Might Just Be Your Company's Biggest Threat - Forbes: “The exploitation of business networks and servers by disgruntled and/or former employees has resulted in several significant FBI investigations,” the FBI said, “in which individuals used their access to destroy data, steal proprietary software, obtain customer information, purchase unauthorized goods and services using customer accounts, and gain a competitive edge at a new company.”

A Third of Ex-Employees Accessing Company Data - Enterprise Network Security Blog from ISDecisions

A Third of Ex-Employees Accessing Company Data - Enterprise Network Security Blog from ISDecisions: Our latest research which surveyed 2,000 desk-based workers in the UK and US reveals at least one in three ex-employees are left with access to systems or data after leaving a company.

Thursday, June 2, 2016

wsRadio.com | 05/27/16 Mayor's Cyber Cup Winners Take on The Cyber Boot Camp - wsRadio.com

wsRadio.com | 05/27/16 Mayor's Cyber Cup Winners Take on The Cyber Boot Camp - wsRadio.com: Stephen Cobb, Sr. Researcher, ESET North America Liz Fraumann, Executive Director, Securing our eCity Foundation provide the details about the upcoming Cyber Boot Camp.

Recalls Look-up by VIN (Vehicle Identification Number)

Recalls Look-up by VIN (Vehicle Identification Number): NHTSA's new search tool lets you enter a Vehicle Identification Number (VIN) to quickly learn if a specific vehicle has not been repaired as part of a safety recall in the last 15 years.

Wednesday, June 1, 2016

Out-of-Box Exploitation: A Security Analysis of OEM Updaters: Blog: Duo Security

Out-of-Box Exploitation: A Security Analysis of OEM Updaters: Blog: Duo Security: "Today, Duo Labs is publishing our take on the OOBE; Out-of-Box Exploitation: A Security Analysis of OEM Updaters."



'via Blog this'

Five tests for a theory of the crime drop - Springer

Five tests for a theory of the crime drop - Springer: "It finds that fourteen of the fifteen hypotheses fail two or more tests. The security hypothesis appears to pass the tests, and thereby pave the way for further research."



'via Blog this'

State CIOs struggle with cybersecurity, cloud computing amid rampant workforce changes, report finds | Healthcare IT News

"State governments face persistent challenges in cybersecurity risk reduction because of four key issues: inadequate strategic direction and organizational structure, constrained security budgets, increasing the sophistication of the threats, and lack of cybersecurity professionals."

http://www.healthcareitnews.com/news/state-cios-struggle-cybersecurity-cloud-computing-amid-rampant-workforce-changes-report-finds

The EU General Data Protection Regulation : : Privacy & Information Security Law Blog

The EU General Data Protection Regulation : : Privacy & Information Security Law Blog: Right to Erasure. Subject to certain exceptions, individuals will be able to request the erasure of their personal data without undue delay.