Although it is sometimes difficult to remember what life was like before COVID, one thing is for certain: healthcare organizations were not as prominent a target for cyberattacks as they are now. Given that healthcare cannot function without the collection of patient data, these organizations represent a potent target for…
When discussing the goings-on of the cybercriminal world, our goal is to give you a larger sense of the threats out there. However, until this article we have yet to address a certain contradiction that exists among many cybercriminal networks. It is not unusual for talented cyberespionage teams to also…
We have all heard the saying that no two fingerprints are alike. And that’s true: even identical twins, who share the exact genetic material, will have different fingerprints. However, we are rarely taught that other aspects of our biology are unique as well. Our physical characteristics—such as our voiceprints, facial…
In our everyday lives, personal hygiene is a sign that we take care of ourselves—not just to the world around us but also to ourselves. And although we attend to our personal hygiene every day, many of us rarely, if ever, take into account the importance of routine cyber hygiene.…
One of the goals of the MyIDMatters quarterly issue is to keep you abreast of new threats in the crimeware space. This way, you not only defend yourself against bad actors, but you also have a better understanding of how they work. In a recent crimeware report, Kaspersky identified new…
In many of our past issues, we have discussed the importance of securing your home WiFi. As we turn the calendar from 2023 to 2024, we thought it would be good idea to head into the new year by discussing tips to ensure your network stays private. Here are some…
With the overwhelming number of bad actors looking to profit off your personal information, it can often feel like there is no way to protect your data privacy. However, just because you are a target by cybercriminals does not mean that you cannot take proactive steps to guard against attacks.…
When many of us think about taking care of our cars, we usually envision the ability to manually replace whatever goes wrong, given enough knowledge and elbow grease. But when car companies promote their fleets as computers on wheels, it becomes obvious that our vehicles contain larger datasets of our…
As we head into the last months of 2023, it is difficult to overstate the data privacy transformations the United States and other global governments are experiencing. This was best observed over the summer when the European Union reached a new agreement with the U.S. over the regulation of the…
Here at MyIDMatters, we are no strangers to the misguided ways in which privacy is publicly discussed, either by the news or those in positions of power. By now, you should also be aware of the ways in which personal privacy is often dismissed or, even worse, denigrated. There are…
By this point, most everyone is at least casually familiar with the AI software ChatGPT, which allows users to input a variety of requests and parameters to produce original pieces of writing. This has resulted in a previously user-generated activity now being automated en masse, altering the way we engage…
Due to the sudden popularity of AI systems such as ChatGPT, many individuals view AI through the lens of user-generated inputs and commands. But AI applications have been employed by businesses for years—and we continually experience their effects in our everyday lives (e.g., Google Cloud or Microsoft Azure). This has…
With the preponderance of articles and think-pieces dedicated to crimeware-as-a-service (CaaS) this year (some of them covered here on MyIDMatters), we might do well to call 2023 “The Year of CaaS.” Unfortunately, however, the rise of CaaS has not led to a rise in awareness of the ways in which…
Responsible for securing institutions, all the way from colleges to banks, multi-factor authentication is a layered approach to securing individuals’ data. Yet despite its importance, many users do not understand the principles behind multi-factor authentication or how it differs from the ubiquitous two-factor identification. In this episode, we will discuss…