Home > Insights > Blogs > Cybersecurity Bits and Bytes

Cybersecurity Bits and Bytes

Cybersecurity Bits and Bytes

(By accessing, browsing or using the pages below, you agree to the Blog Conditions of Use/Disclaimer available under "Links.")


How to combat the risks of impersonation emails, imitative domains

Mark Sableman October 13, 2016

Companies are incurring significant damages from email spoofing, executive impersonation, and misuse of company trademarks and website content. Here are some steps to take before and after an attack. READ MORE

When smart goes bad: Why internet security does not just refer to computers

Cybersecurity_default blog

From smart thermostats that can be adjusted and set remotely to toasters and coffee makers that can be programmed to operate at specific times on specific days, smart devices are fast becoming a part of all of our lives. But are these smart devices and their connectivity secure? READ MORE

The serious security vulnerabilities of mobile devices

Mark Sableman September 28, 2016
illustration of a mobile device with a key "locked" into it

A new report from NIST highlights the many security threats associated with mobile devices. These threats are even more concerning for businesses whose employees use unsecured mobile devices to conduct business or send communications about proprietary or financial information. READ MORE

Don’t doubt the data breach: Massive Yahoo hack reminds us it’s not if, but when

Jason Schwent Fredric Roth V September 22, 2016
cyber hacker with computer

Yahoo’s announcement that a hacker exposed the information of over 500 million of its users is a strong reminder to all companies the importance of a breach response plan. Here we outline some tips for key elements of such a plan. READ MORE

Chicago cybersecurity event to address U.S.-EU data regulation

Melissa Ventrone September 13, 2016
US EU flags

Cybersecurity chair Melissa Ventrone will team up with colleagues from the United Kingdom on Sept. 29 to present “Transatlantic data: What U.S. companies need to know about the GDPR and EU data privacy laws” in Chicago. The one-hour CLE-accredited program will address the European General Data Protection Regulation, which was adopted this year and comes into full effect in May 2018. READ MORE

NIST and FAIR develop tool to merge cybersecurity risk standards


A set of joint resources from NIST and FAIR can help cybersecurity professionals to both prioritize risks in their organization and allocate security resources to the most critical areas of exposure. READ MORE

Is encryption the key to your data security?


Businesses must plan for the failure of technologies like firewalls, strong passwords, anti-malware, two-factor authentication and data sandboxing. In the event that unauthorized individuals gain access to sensitive data, businesses are increasingly turning to data encryption to safeguard the data itself. READ MORE

Can 3D printing technology be stolen by sound recorders?

3D Printer - Hand

There is little question that 3D printing is an important part of technology and manufacturing development. But a recent study may raise some concern over the security of that technology in an unexpected way. READ MORE

What you need to know about the new EU-U.S. data transfer pact

US EU flags

The U.S. and EU have negotiated a new pact that would allow for U.S. companies to collect and store personally identifying information about EU citizens and to protect those citizens’ privacy pursuant to EU standards. So what are the requirements of this new Privacy Shield and what do they mean for U.S. companies doing business with European customers? READ MORE

Illinois strengthens, expands scope of personal information protections

data privacy

With the passage of the Illinois Personal Information Protection Act (HB1260) last month, Illinois substantially broadened the definition of personally identifiable information, and imposed requirements on data collectors for the protection of Illinois residents’ information. READ MORE