Editor’s note: This is the second in a two-part series about the impacts of the collection, distribution and commercial use of consumer data. Part I was published in the Nov. 16 edition of the Business Journal. All day, every day, companies are sucking up vast amounts of your personal information,...
You’d be amazed at how precisely companies can tailor their advertising based on your data. You’d be even more amazed at where — and how easily — they find it. “The one that people are most surprised by is location-based targeting,” said Timothy Zercher, president and CEO of Pueblo-based EasySocial,...
Cyberattacks on businesses surged 55 percent in the third quarter of 2018, according to the latest Malwarebytes report, as cybercriminals ditched attacks on individuals in favor of more data-rich victims. Businesses saw an 88 percent increase in ransomware attacks alone, in what the Malwarebytes Labs Cybercrime Tactics and Techniques Report...
Federal Deputy Chief Information Officer Margie Graves headlined the inaugural Cyber Security for Small Business Summit Oct. 26, taking questions from Colorado Springs business leaders in a wide-ranging discussion. Graves was afternoon keynote speaker for the event, hosted by the Colorado Small Business Development Center. From questions Graves fielded on...
As a business, who should you trust? Which companies are you confident won’t lose your customers’ information to cybercriminals, or leave a virtual back door open for hackers? Mark Bristow, director of the National Cybersecurity and Communications Integration Center Hunt & Incident Response Team with the Department of Homeland Security,...
Election security is front and center as the midterms approach, and the National Cybersecurity Center has announced it’s investigating how blockchain can help secure elections — and potentially make widespread mobile voting a reality. The NCC announced a partnership with Tusk Montgomery Philanthropies to work on “Proving Our Democracy,” a...
Assume your business is going to get hacked — because statistics and human nature say it will. The question is, how will you know, and what will you do to limit the damage? Even a quick look at the recent Black Hat 2018 Hacker Survey Report and the 2018 Study...
  It’s time to take hacking personally, John Sileo says. Whether you’re a victim because Equifax lost your entire credit profile, or because Russians hacked your data from Facebook, the way to start securing your life and your business against cybercrime is to take it personally. Sileo knows this from bitter experience. Sixteen...
Colorado Springs is now home to the nation’s first cybersecurity CTSO, thanks to a grassroots push by local cyber educators and students. A CTSO is a Career and Technical Student Organization (prominent examples include DECA and Future Business Leaders of America) and this new CTSO is designed to get kids...
The money has started to flow for Colorado’s sweeping cybersecurity plans, after Governor John Hickenlooper signed Senate Bill 086 into law at the end of May. SB 086 “Cyber Coding Cryptology for State Records” is the bipartisan bill that funds the requirements of 2016’s House Bill 1453, which created the...
If you think paper jams are bad, wait till you find out hackers have taken over your printer. It’s more common than most people think. Flagging the gravity of the threat: In late July, printer giant HP partnered with Bugcrowd to launch a first-of-its-kind private bug bounty program that promises up...
The good news: Cybersecurity still needs humans. The bad news: Cyber threats are so numerous that humans alone can’t handle them — and they’re so nuanced, they can’t all be farmed out to artificial intelligence. “he issue is that we’re dealing with so many vulnerabilities that we can’t possibly answer all...