Lizzie Kardon’s article is a timely guide to the different methods by which cyber attacks are launched and the tools used to deliver them. As the goals and objectives for such attacks differ, it is critical to employ accurate and effective strategic and tactical processes to prevent and to repel attacks that are steadily increasing as the Internet of Things (IoT) expands in arenas that span work, home, government, social media, healthcare and beyond.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Note – two highlight of this week’s column: the Supreme Court struggles to define ‘searches’ as technology changes, and how Google employees avoid phishing attempts with a $20 YubiKey security key.