The Privacy Professor Blog

How Crooks are Using AI in Social Engineering Attacks

By Rebecca Herold | Dec 29, 2023

AI is being used much more frequently, and in new and unexpected ways, to not only launch social engineering attacks, but also to facilitate many new types of cyberattacks. In addition to research I’ve done in this area, one of our other Privacy & Security Brainiacs team members, Noah Herold, has also done research for how AI is being used for social engineering and other cybercrime tactics.

Actions and Tools to Prevent Being Victimized by Caller Spoofing

By Rebecca Herold | Dec 29, 2023

Calls impersonating/spoofing others are becoming harder to spot as technology advances, and as artificial intelligence (AI) tools are able to audibly sound just like the legitimate person they are claiming to be. It makes it important for you (and your family, friends and customers) to keep awareness high.

HIPAA Physical Safeguards Require More than Most CEs and BAs Think

By Rebecca Herold | Dec 29, 2023

We have a medium-sized hospital, with seven clinics, telehealth and mobile (including home visits) healthcare services. Different vendors are giving us conflicting information about the requirements for HIPAA physical safeguards. Some vendors have told us that physical safeguards only apply to using locks and cameras on our hospital building. Others said other things. Can you help us understand what HIPAA actually requires to meet their physical safeguard requirements?

Protecting Your Life from ID Theft: A Cybersecurity Expert’s Real-Life Experience

By Rebecca Herold | January 7, 2023

Listen in to hear my riveting conversation with Christine Abruzzi, a cybersecurity expert with 30 years of experience, and owner of Cacapon Cyber Solutions, describing her current real-life experiences in helping a family member who is an identity theft victim.

“Smart” Jewelry Without Security & Privacy is Dumb and Dangerous

By Rebecca Herold | January 1, 2023

Many types of “smart” internet-of-things (IoT) wirelessly-connected jewelry have popped up in recent years. We even answered a question about the Oura Ring, in our August issue. But, is this jewelry, meant to provide safety alerts, privacy-friendly, and cyber-secure?.

Be Safer in the Internet of Things on Safer Internet Day!

By Rebecca Herold | February 7, 2022

Because of the complexity of the IoT products, there are many security and privacy vulnerabilities within IoT products. And so they are also a favorite target of cybercrooks, cyber snoops, and others who want to know how, when and where you’re using your IoT products.

How Much of Your Privacy Are Your Browsers Leaking?

By Rebecca Herold | December 30, 2021

In our Privacy Professor January Tips of the Month, one of the privacy beacons we highlighted was the “Cover Your Tracks” website from the Electronic Frontier Foundation (EFF). Here are the results of our testing with this website.

Suggestions for Consumers Using IoT Products Containing Log4j

By Rebecca Herold | December 28, 2021

Many of our Privacy and Security Brainiacs and Privacy Professor consultancy clients have asked for a simple description of the Log4j problems they’ve seen so much about in the news lately. Here are some key facts and advice we’ve provided to them.

Organizations Need to Use More Than One Type of Encryption

By Rebecca Herold | March 28, 2021

What encryption solution businesses use? Every type of organization will typically each need to use at least two, but usually more, types of encryption solutions to meet their needs. Why? Because each organization needs to encrypt personal data, sensitive data, and a wide range of other types of regulated data, wherever the data is collected, stored, or transmitted.

2020 Was a Wakeup Call: Don’t Shut the Curtain and Go Back to Sleep in 2021!

By Rebecca Herold | December 15, 2020

2020 was a wakeup call for more than healthcare pandemic preparedness. It also exposed some huge security and privacy vulnerabilities, that many cybercrooks have exploited thousands of times throughout the year, for remote workers; both those work-from-home (WFH) employees, along with those mobile workers who have largely been going under the CISOs’ and information security departments’ radars for the past two to three decades. Will cybersecurity and privacy pros heed the lessons learned from the awakening?

The Spies Who Eavesdrop on Your Work from Home: Part 2 – Apps

By Rebecca Herold | May 17, 2020

In my previous blog post, I described how one of my monthly Privacy Professor Tips readers recently sent me a question about some unusual coincidences where it seemed that home conversations and activities were then known and discussed by workers. When working from home, or mobile working while traveling, it is important to remember that cybercrooks and business competition are actively exploiting the vulnerabilities that are present in most home offices, hotels, restaurants, airports, and a long list of other locations where remote work occurs.

The Spies Who Eavesdrop on Your Work from Home: Part 1 – IOT

By Rebecca Herold | May 5, 2020

With what may be the majority of office workers throughout the world now working from home, cybercrooks and business competition are actively exploiting the vulnerabilities that are present in most home offices. This series of blog posts focus on fours ways in which digital spies enter home office areas, and some information security and privacy protections you can put in place to shut the holes in the digital pathways created into your organization through working from home office areas. Part 1 provides an overview of digital spies coming through IOT devices.

What Business Leaders Need to Know About Privacy Breach Notifications

By Rebecca Herold | April 18, 2020

There will come the inevitable day when your organization will need to make a privacy breach notice. Will you be prepared and know what to do when this day comes?

You Will Be Judged by the Company You Keep

By Rebecca Herold | April 4, 2020

All organizations need to identify and document all the outsourced and contracted entities that possess or otherwise access their information, in all forms. Here are some reasons why.

Fired Because Photo of Surgery Room Was a HIPAA Violation

By Rebecca Herold | March 28, 2020

With the preponderance of people now taking photos and videos with their phones as part of their standard daily activities, the number of situations where healthcare workers are capturing images and posting on their Instagram, Facebook and other social media sites is dramatically increasing. What does this mean for compliance with the HIPPA Privacy Rule?

HIPAA and Calling Out Full Names In Waiting Rooms

By Rebecca Herold | March 28, 2020

Is it a HIPAA violation to call out a patient’s full name in the waiting room? What factors go into deciding whether something like this is a HIPAA violation? The Privacy Professor Explains.

Why You Should Use a Right to Audit Clause

By Rebecca Herold | March 28, 2020

A right to audit clause is a good idea for all types of organizations, of all sizes, not only as a way to demonstrate due care, about also to to be proactive in preventing privacy breaches and security incidents. Here are the top reasons why you should have right to audit clauses within business partner contracts.

Revisiting the Theory for How Eddie Tipton Committed the Largest Lottery Fraud in History

By Rebecca Herold | March 25, 2020

Eddie Tipton, an information security officer, was able to successfully rig the Hot Lotto random number generator and commit the largest lottery fraud in US History. How did he do it? The Privacy Professor explains.

Top 4 Reasons Encryption Is Not Used

By Rebecca Herold | March 21, 2020

During my work with a wide range of small to large organizations, in a wide range of industries, I’ve found there are some common reasons why encryption is not implemented. Here are the top four I’ve run across.