History’s Biggest Breach

This story has far-reaching implications that could affect every walk of life: the personal information of millions of schoolchildren has been put at risk after the successful hacking of PowerSchool, the developer of a widely used education tech program. The company’s Student Information System (SIS) is a digital platform that…

Continue Reading

DOGE’s Civilian Data Oversight

The newly establish Department of Government Efficiency (DOGE) has created quite the stir in Washington, causing legal experts to speculate that the organization has violated the Privacy Act as well as various cybersecurity laws. By taking control of the Treasury Department’s central payments database, they argue, DOGE has created an…

Continue Reading

The Danger of Reporting a Data Breach

Although this story occurs outside of the United States and United Kingdom, it details governmental cybersecurity actions that should concern citizens everywhere. The Turkish government is proposing a law to empower their recently conceived Cybersecurity Directorate. Prior to this proposal, Turkey mirrored the United States by lacking comprehensive federal cybersecurity…

Continue Reading

The DeepSeek Disruption

Poised to radically disrupt the generative AI space, the Chinese startup, DeekSeek, sent shockwaves across global economic markets after debuting its R1 AI assistant in January. As a reasoning model, DeepSeek is fed a myriad of data by its parent company, High-Flyer, so that it can train itself to better…

Continue Reading

LockBit: Don’t Call It a Comeback

It appears the notorious ransomware group, LockBit, is back on the scene after making headlines as the most ubiquitous form of ransomware in 2022. With double extortion tactics and an ability to work around traditional security measures, this Ransomware-as-a-Service (RaaS) model is deceptive, effective and able to distribute malware at…

Continue Reading

What Can We Expect from the New Administration?

With every new presidential administration comes a new approach to federal policy—and this includes new approaches to cybersecurity protections. In the wake of the January inauguration, the question on many cybersecurity experts’ minds is: what should we expect from the Trump administration? Will previous strategies continue to be employed, or…

Continue Reading

What Is So Dangerous About TikTok?

The recent enforcement of the TikTok ban (prior to its temporary reversal by President Trump) has left many wondering about the risks posed by the popular social media app. Sure, TikTok is owned by a Chinese company, but how dangerous is this really to national security and our data privacy?…

Continue Reading

Key Preventative Cybersecurity Measures

As we reach the end of the Holiday season, individuals are more likely to be reactive as opposed to proactive in how they treat their online activity. That’s why we reached out to Phil Reitinger to discuss a few crucial steps to keep your cybersecurity at the forefront of your…

Continue Reading

The Importance of Federal Cybersecurity Infrastructure

We know, we know: infrastructure is not the sexiest topic when it comes to cybersecurity. However, powerful cybersecurity is not only impossible without strong infrastructure—infrastructure is also one of the most important assets for cybersecurity to protect! The unspoken bulwark against bad actors is our federal cybersecurity infrastructure; however, some…

Continue Reading

Global Cybersecurity Rule Changes

In previous issues, we have discussed the relative paucity of cybersecurity laws in the United States. Despite the relative lack of  legislation in the United States, 2024 saw tremendous changes to cybersecurity rules across the globe. Here are some of those changes: The E.U.’s NIS2 – With a 21-month implementation…

Continue Reading

Android Malware Strikes

Although most cybersecurity attacks have been levied against laptops and home networks, the rise of the use of smartphones has forced bad actors to get more creative. One recent case of a smartphone malware campaign targets Android users specifically. By stealing contactless credit card payment data, hackers can leverage this…

Continue Reading

Changes to HIPPA Coming

For nearly 30 years, the Health Insurance Portability and Accountability Act (HIPPA) has protected sensitive health information from being disseminated to third parties without the consent of the patient. The right to one’s own medical information is critical, especially in a day and age in which personal information is being…

Continue Reading

The FCC’s New Role

The launch of the Federal Communications Commission’s (FCC) privacy and data protection task force in June of 2023 has led to several major privacy actions. It has also resulted in multiple partnerships between the agency and 10 different state attorneys general. The decision of the FCC to take an active…

Continue Reading

Just How Important Is Customer Privacy, Really?

It has been a few issues since we have discussed a widespread trend in customer behavior that has impacted how companies do business; the importance of safeguarding consumers’ privacy. In the age of AI, it is more important than ever for companies to take proactive and intentional steps to protect…

Continue Reading