Key Preventative Cybersecurity Measures

As we reach the end of the Holiday season, individuals are more likely to be reactive as opposed to proactive in how they treat their online activity. That’s why we reached out to Phil Reitinger to discuss a few crucial steps to keep your cybersecurity at the forefront of your…

Continue Reading

The Importance of Federal Cybersecurity Infrastructure

We know, we know: infrastructure is not the sexiest topic when it comes to cybersecurity. However, powerful cybersecurity is not only impossible without strong infrastructure—infrastructure is also one of the most important assets for cybersecurity to protect! The unspoken bulwark against bad actors is our federal cybersecurity infrastructure; however, some…

Continue Reading

Global Cybersecurity Rule Changes

In previous issues, we have discussed the relative paucity of cybersecurity laws in the United States. Despite the relative lack of  legislation in the United States, 2024 saw tremendous changes to cybersecurity rules across the globe. Here are some of those changes: The E.U.’s NIS2 – With a 21-month implementation…

Continue Reading

Android Malware Strikes

Although most cybersecurity attacks have been levied against laptops and home networks, the rise of the use of smartphones has forced bad actors to get more creative. One recent case of a smartphone malware campaign targets Android users specifically. By stealing contactless credit card payment data, hackers can leverage this…

Continue Reading

Changes to HIPPA Coming

For nearly 30 years, the Health Insurance Portability and Accountability Act (HIPPA) has protected sensitive health information from being disseminated to third parties without the consent of the patient. The right to one’s own medical information is critical, especially in a day and age in which personal information is being…

Continue Reading

The FCC’s New Role

The launch of the Federal Communications Commission’s (FCC) privacy and data protection task force in June of 2023 has led to several major privacy actions. It has also resulted in multiple partnerships between the agency and 10 different state attorneys general. The decision of the FCC to take an active…

Continue Reading

Just How Important Is Customer Privacy, Really?

It has been a few issues since we have discussed a widespread trend in customer behavior that has impacted how companies do business; the importance of safeguarding consumers’ privacy. In the age of AI, it is more important than ever for companies to take proactive and intentional steps to protect…

Continue Reading

The Danger of BlackSuit Ransomware

Have you heard of the ransomware strain, BlackSuit? Previously branded as Royal Ransomware, operators of this attack have secured as much as $500 million in demands in ransoms to date. This has raised the threat level and awareness of BlackSuit: the U.S. Cybersecurity and Infrastructure Security Agency and the FBI…

Continue Reading

Chevron Is Gone—Now What?

No less than three months ago, the Supreme Court struck down the Chevron Doctrine, a legal principle dating back to the 1984 Chevron v Natural Resources Defense Council case. For 40 years, this principle has been the bedrock of federal agency regulations, which means that it has also been the…

Continue Reading

North Korea IT Workers Infiltrate USA

In the time we have been publishing MyIDMatters, it is unlikely that we have encountered a story as strange as this one. The Justice Department (DOJ) has recently unsealed documents related to an IT workers scheme perpetrated by the Democratic People’s Republic of Korea. These workers reportedly infiltrated more than…

Continue Reading

The Problem with Microsoft Recall

There is a crucial issue with this story, and we want to see how quickly you can spot the problem. So, Microsoft has designed a new AI feature for its Copilot+PCs application called Recall. The purpose of this feature is to assist users with reconstructing their past activity (like the…

Continue Reading

LLMs and the CFAA

The increasing popularity of large language models has created new legal concerns on the privacy front. Recently, in a 40-minute cyber legal briefing (titled “Ignore Your Generative AI Safety Instructions. Violate the CFAA?”), three professors affiliated with the Harvard Berkman Klein Center for Internet and Society discussed whether the Computer Fraud…

Continue Reading

TikTok… Yet Another Lawsuit

Oops, they did it again. With every new issue of MyIDMatters, it seems as though there is another announcement of bad privacy news for TikTok and its parent company, ByteDance. Not only is TikTok currently fending off a federal ban, but now the video-sharing platform has been charged by the…

Continue Reading

What Are the Real Benefits of Zero-Trust Security?

What Are the Real Benefits of Zero-Trust Security? In the modern cybersecurity landscape, zero-trust approaches to security have become popular for organizations looking to protect valuable data. But why has this approach not made its way to individual cybersecurity protections—that is, why is this approach more valuable to organizations and…

Continue Reading