All posts by Jed Cassinelli

US Secret Service Warns of Mobile Payment Fraud

By | Data Security, Privacy, Security | One Comment

You know there’s a major problem with mobile security when the United States Secret Service starts talking about it. Last week, the Secret Service issued a warning about a recent wave of identity theft incidents involving mobile payment systems. According to the Secret Service’s advisory, a growing number of criminals are exploiting vulnerabilities in near-field communication (NFC)-based mobile payment systems…

Read More

Venom Vulnerability Exposes Cloud Insecurities

By | Cloud Storage, Corporate Compliance, Data Security, Enterprise Collaboration, Facts About the Cloud, Information Technology | No Comments

When you store your data in the cloud, the reality is that it usually lives on a server within a massive data center made up of many servers. Each server generally hosts multiple virtual machines that act as separate environments for individual accounts, allowing the provider to store your data in a way that keeps it segregated from other people’s…

Read More

How Secure Is Apple Pay on the Apple Watch?

By | Data Security, Enterprise Collaboration, Information Technology | No Comments

The Apple Watch is scheduled to ship on April 24th, and with a recent controversy over fraud on Apple’s mobile payment platform, people are asking tough questions about the security of their new smartwatch, especially about how it syncs with Apple Pay. (To learn more about how Apple Pay works – hint: tokenization – read this post.) Much like the…

Read More

How and Why to Protect Your PII

By | Corporate Compliance, Data Security, Enterprise Security, Information Technology | No Comments

What is PII? Personally identifiable information, or PII, is a common term in information security and privacy law denoting any information that can be used to identify an individual – alone or in context with other information. PII can be used by hackers and malicious parties to steal or exploit an individual’s identity, and with the high frequency of data…

Read More

Is Apple Pay Just What Credit Unions Are Looking for?

By | Corporate Compliance, Data Security, Enterprise Collaboration | No Comments

Apple Pay now has around 90 banks and credit unions signed up to support Apple Pay in some way, and credit unions make up nearly half of that list. Credit Union Magazine attributes the high percentage to “the credit union movement’s commitment to remaining relevant and increasing its growth momentum.” In other words, credit unions have a mission to serve…

Read More

A Global Look at Cybersecurity

By | Corporate Compliance, Data Security, Information Technology | No Comments

Last year, McAfee and the Center for Strategic and International Studies published a report on the cost of cybercrime, estimating the annual cost to the global economy to be over $400 billion. The U.S., China, Japan, and Germany account for $200 billion of that. With the State of the Union address and ensuing changes in cybersecurity regulations in the U.S.,…

Read More

Credit Unions Run the Numbers on the Home Depot Data Breach

By | Corporate Compliance, Data Security | No Comments

The Credit Union National Association (CUNA) recently collected data from over 500 credit unions regarding the Home Depot data breach. The survey sought to uncover the various effects of the breach – from numbers of affected customers to the total cost to each credit union. The findings paint a clear picture: When it comes to data breaches, credit unions are…

Read More

Can Biometrics Cure the BYOD Blues?

By | Corporate Compliance, Data Security, Enterprise Collaboration | No Comments

Unique personal identifiers such as fingerprints, face shapes, and voiceprints are being incorporated into software and hardware security on new consumer devices at an astonishing rate. Apple is now two generations into their iPhone fingerprint scanner and, with the launch of Apple Pay, the masses are getting a taste of how biometrics can be used to authorize transactions. Can new…

Read More

Automated Policy Enforcement a Boon for Data Security

By | Corporate Compliance, Data Security | No Comments

Automated policy enforcement, the use of software to ensure sensitive data is protected from human error, is becoming an important weapon in the war on data breaches. The key tenets of automated policy enforcement revolve around reducing reliance on users to self-direct complex data policies. In doing so, the goal is to eliminate the risk of data breaches that occur…

Read More
Sound exciting? Try Arc for free now! Get Started