The “Why” Behind Cybersecurity

Consumers of every stripe are told that deploying home cybersecurity protection measures is an important component of good cyber hygiene. But despite the importance of cybersecurity protection, we rarely stop to ask ourselves: What do we need our cybersecurity to protect? As a result, most home cybersecurity protection is grounded…

Continue Reading

The Far Reach of Data Brokers

Although many of us accept the fact that our personal data can be accessed by third-party actors, we are often unaware of the role data brokers play in the dissemination of this information. These shadow actors contribute to a $214 billion industry that affects tens of millions of Americans by…

Continue Reading

A Ranking of the Best States for Cyber Privacy

It seems like every newsletter update contains yet another enactment of a new state privacy law. And while this is great news for consumers, it can sometimes be difficult to keep track of whether your state has strong privacy laws. Recently, a new ranking of the best and worst states…

Continue Reading

Trends in 2024 Cybersecurity

As we transition out of the first quarter of 2024, now is a good time to review the anticipated cybersecurity threats for the year. So far, we have already witnessed the rise of AI-enabled threats as well as new geopolitically motivated attacks that utilize AI tools. However, important questions remain:…

Continue Reading

ChatGPT and Privacy Laws

In previous newsletters, we have analyzed the possible privacy violations committed by ChatGPT’s parent company, OpenAI. Specifically, we noted that the company may have violated EU privacy laws. Potential privacy concerns were not properly assessed and addressed… the language model collects your account information, data from your device and browser…

Continue Reading

Reporting a Cyberattack

Imagine the following scenario: you receive an email from an old acquaintance that you did not expect. Your friend has attached a document they want you to examine; however, what you do not realize is that your friend’s email has been compromised. Shortly after receiving and opening the email, you…

Continue Reading

Foreign Attacks on Home Office Routers

Recently, the Department of Justice announced that a “December 2023 court-authorized operation disrupted a botnet of hundreds of U.S.-based small office/home office (SOHO) routers hijacked by People’s Republic of China (PRC) state-sponsored hackers.” This operation required the DOJ to delete the botnet coding from the routers in question and block…

Continue Reading

How to Judge a Company by Its Cybersecurity Practices

When it comes to choosing organizations to share your personal data with, it can often feel like your options are few and far between. This is because many of the services we use (such as healthcare) require the consenting exchange of personal data. However, just because your data must be…

Continue Reading

Healthcare Organizations Remain a Target

Although it is sometimes difficult to remember what life was like before COVID, one thing is for certain: healthcare organizations were not as prominent a target for cyberattacks as they are now. Given that healthcare cannot function without the collection of patient data, these organizations represent a potent target for…

Continue Reading

Cyberespionage or Cybercrime: Who Is Asylum Ambuscade?

When discussing the goings-on of the cybercriminal world, our goal is to give you a larger sense of the threats out there. However, until this article we have yet to address a certain contradiction that exists among many cybercriminal networks. It is not unusual for talented cyberespionage teams to also…

Continue Reading

Biometric Laws and Privacy

We have all heard the saying that no two fingerprints are alike. And that’s true: even identical twins, who share the exact genetic material, will have different fingerprints. However, we are rarely taught that other aspects of our biology are unique as well. Our physical characteristics—such as our voiceprints, facial…

Continue Reading

The Importance of Cyber Hygiene

In our everyday lives, personal hygiene is a sign that we take care of ourselves—not just to the world around us but also to ourselves. And although we attend to our personal hygiene every day, many of us rarely, if ever, take into account the importance of routine cyber hygiene.…

Continue Reading

GoPIX and Lumar: New Crimeware Threats

One of the goals of the MyIDMatters quarterly issue is to keep you abreast of new threats in the crimeware space. This way, you not only defend yourself against bad actors, but you also have a better understanding of how they work. In a recent crimeware report, Kaspersky identified new…

Continue Reading

Tips for Securing Your WiFi

In many of our past issues, we have discussed the importance of securing your home WiFi. As we turn the calendar from 2023 to 2024, we thought it would be good idea to head into the new year by discussing tips to ensure your network stays private. Here are some…

Continue Reading