Why Are You Getting This?
You signed up to receive the Tips, initiated contact to stay in touch with Rebecca and/or Privacy & Security Brainiacs (PSB) or consented to receive the Tips. Please read our Privacy Notice & Communication Info at the bottom of this message for more information. You may unsubscribe from there as well.
| |
Disaster- Proof Your Summer Time! | |
Summer in the northern hemisphere starts on June 21st. As the heat increases, so do disastrous security incidents and privacy breaches. Scammers also get more inventive with their crimes. This includes how the cybercriminals are targeting their victims through the public’s increased use of tech like QR codes, surveillance tech, and an increasingly vast array of social engineering methods.
This month we are passing along a long list of interesting news stories, answering readers’ questions to help our readers to prevent being victims of digital, and some physical, disasters. We also are recognizing some inspiring privacy and security beacons, and providing some information about interesting articles, events and opportunities.
Thank you for all your messages! We sincerely appreciate them. We are happy to hear so many of you like both our lists of news, in addition to the questions and answers. And we also have our longtime privacy beacons fans, many of whom have indicated those examples have spurred them on to make changes within their own personal lives, as well as in their businesses.
Do you have stories, examples, or concerns about the topics covered in this issue that you would like us to provide feedback on? Send them over! We may discuss them in an upcoming Tips.
We hope you are finding all this information valuable. Let us know! We always welcome your feedback and questions.
Thank you for reading!
| |
June Tips of the Month
- News You May Have Missed
- Privacy & Security Questions and Tips
- Data Security & Privacy Beacons*
- Where to Find the Privacy Professor
| |
Thank you for your enthusiastic messages about our news items; we are so happy to know you like them! If you are new to getting our monthly Tips publication, in this section we’re sharing a wide range of interesting security and privacy related news that demonstrate that such types of risks exist basically anywhere in the world, and that everyone needs awareness. Here is a list of 30 such articles our Privacy & Security Brainiacs team found interesting throughout the past month, in no particular order. Read next month for even more. Do you have interesting, unusual, bizarre or odd stories involving security and privacy? Let us know!
1. Iowa, Pay Close Attention To The Gas Pumps You’re Using. Card skimming devices are increasingly being found in all US states, and in other countries throughout the world.
2. Your phone can tell when you’re depressed. Emerging apps use AI to guess when you’ll be sad. “Can they also help you feel better?” Who is getting the data from these apps? Yikes! Now we’re sad and stressed.
3. Homeowners across the country have had their coverage ended due to aerial monitoring of their homes by insurance companies using technology including drones, airplanes and satellites.
4. Why Lumen's water leak caused such widespread phone, internet outages, leaving tens of thousands of Iowans without phone and internet service, including a landline 9-1-1 outage.
5. The Internet of Things (IoT), with its devices' interconnected nature and vulnerabilities, has become an attractive target for cybercriminals operating out of the dark web. One weak link – i.e., a compromised IoT device – can compromise the entire network's security. The financial repercussions of a breached device can be vast, not just in terms of ransom demands but also in regulatory fines, loss of reputation and the cost of remediation.
6. These cities bar facial recognition tech. Police still found ways to access it. Citing concerns about accuracy and racial bias, the cities banned the technology. So, some police officers sought help from other law enforcement agencies.
7. New privacy-preserving robotic cameras obscure images beyond human recognition. The distorted images can still be used by robots to complete their tasks but do not provide a comprehensive visual representation that compromises privacy.
8. The Hidden-Pregnancy Experiment. “We are increasingly trading our privacy for a sense of security. Becoming a parent showed me how tempting, and how dangerous, that exchange can be.”
9. How to escape Honda’s privacy hell. It’s very hard to opt out of the data nightmare that comes off the lot. I was the first person to ask my Honda dealer how to turn off data sharing. It didn't go well.
10. CEO of world’s biggest ad firm targeted by deepfake scam. Fraudsters impersonated WPP’s CEO using a fake WhatsApp account, a voice clone and YouTube footage used in a virtual meet. The scam, which was unsuccessful, targeted an “agency leader,” asking them to set up a new business in an attempt to solicit money and personal details.
11. Woman Found Living in Michigan Store Sign Told Police It Was a Little-Known 'Safe Spot'. Police in Michigan have released body camera video of an encounter with a woman who was living inside a sign on the roof of a grocery store. NOTE: Lack of supermarket physical security provides homeless woman her physical security…for a year.
12. One bank's brilliant upgrade was another bank's crash. "Who's the more foolish: the fool, or the fool who follows him?" NOTE: Secure coding practices likely could have prevented this problem.
13. Shuttered Des Moines bar Zora hit with foreclosure, latest setback for owner Edwin Allen. More fallout resulting, in part, from stalking with an Apple AirTag, which made international news and put awareness of all other problems for actions occurring within the business.
14. Who took $105,000 from security expert's Iowa account? Months later, he still doesn't know. Check fraud cases are skyrocketing.
15. 100 Million Scripts Came Through Illegal Online Pharmacies Last Year. Figure represents 2% of all U.S. prescriptions, according to IQVIA report.
16. “Unprecedented” Google Cloud event wipes out customer account and its backups. UniSuper, a $135 billion pension account, details its cloud compute nightmare.
17. Elvis Presley's granddaughter is trying to halt the sale of Graceland, accusing those involved of using forged signatures. A reminder that old-fashioned identity fraud is still used.
18. Missing Kansas City man with dementia found in Indianola, Iowa, by new cameras that read license plates. Indianola Police say their new license plate recognition cameras, called Flock cameras, notified an officer in the area, who was then able to pull the man over and return him to his family. This is a beneficial use of such cameras. The privacy problems still need to be resolved.
19. Flaws in Cinterion modems hit multiple critical infrastructure sectors. Critical flaws that permit remote code execution and unauthorized privilege escalation, posing great risks to Internet of Things (IoT) devices widely found in the industrial, healthcare, automotive, financial and telecom sectors.
20. Chat Xi PT? China’s Chatbot Makes Sure It’s a Good Comrade. Chinese AI companies must overcome chip restrictions and strict regulations in creating chatbots on par with ChatGPT. "Designed by China’s cyberspace academy, the chatbot derives data from seven sources. Six of them are professional databases about technology. The other is the doctrine, known formally as “Xi Jinping Thought on Socialism With Chinese Characteristics for a New Era.”"
21. Des Moines swindler who preyed on single women he met on dating sites gets up to 15 years. “Featured in a Watchdog column on Valentine’s Day, his modus operandi was well documented in court cases: Gain the trust of single women; pose as an employee of a cellphone company; gain access to their phones, service plans and credit; and purchase electronics, including cellphones and Apple watches, that could be sold or pawned.”
22. PayPal is planning an ad network built off your purchase history. “You are the product, after all.”
23. Research finds electric cars are silent but violent for pedestrians. You're three times as likely to be hit by a battery-powered vehicle.
24. An attorney says he hired a professional moving company to properly dispose of documents from his old office, but dozens of files ended up in open dumpsters behind a shopping center in Bonita, California. Inside, papers with a lot of personal information that someone could easily use for identity theft.
25. US FTC’s breach notification draws fire from dissenting commissioners.
26. The University of Groningen's Speech Technology Lab say they have created a multimodal algorithm sarcasm detector. It involves analyzing speech for pitch, speaking rate, and energy, then transcribing it into text for sentiment analysis.
27. Tesla devotee tests Cybertruck safety with his own finger – and fails. The frunk broke his finger. Tesla warned that it could.
28. Starlink suffers 'degraded service' from solar storm but emerges intact. The geomagnetic storm that led to nighttime light shows in May also caused problems for the Starlink satellite broadband service, disrupted GPS signals, and affected the orbit of the Hubble Space Telescope.
29. AI Is Deciphering Your Corporate Trade Secrets. By sifting through vast amounts of data, AI can uncover hidden relationships, infer processes, and even reverse-engineer products that were once thought to be secure.
30. 68% of British MPs have had personal data exposed on the dark web. Hundreds of EU politicians have also fallen victim.
Have you run across any surprising, odd, offbeat or bizarre security and/or privacy news? Please let us know! We may include it in an upcoming issue.
| |
Privacy & Security Questions and Tips
Rebecca answers hot-topic questions from Tips readers
June 2024
| |
We continue to receive a wide variety of questions about security and privacy. The number of questions we are receiving about HIPAA and personal health data are also increasing. Thank you for sending them in! This month in addition to our Question of the Month we’ve included seven Quick Hits questions.
Are the answers interesting and/or useful to you? Please let us know! Keep your questions coming!
| |
Question of the Month:
Q: Our city installed parking that uses QR codes for payment, and more of our restaurants, stores, etc. are also urging us to use QR codes for payment. Are those safe?
| |
A: For readers who may not be familiar with this term, “QR” stands for “quick response.” It refers to the instant access to the information contained in the square-shaped code. It is the next generation of a barcode. If legitimate QR codes are not tampered with, they are usually safe. It is important to understand, though, that any QR code is susceptible to tampering, particularly those in those made available for public use. Since making payments is one of the primary uses of QR codes, before using them, take a little bit of time to ensure any code you scan in public is untampered.
Here are a few tips to avoid becoming a QR code scam or phishing victim:
- Be suspicious. Avoid using unsolicited QR codes, especially those in public places, from unknown people, or that urge you to use them as quickly as possible.
- Avoid payments using public QR codes. It is incredibly easy to replace such QR codes, particularly with no physical protection in place to prevent such replacement.
- Use a QR code scanner app. Consider using a dedicated QR code scanner app instead of your phone’s camera app. Look for a scanner app that has extra security features such as checking website safety and doing code analysis.
- Validate the sources are trusted. If you receive a QR code from a company you know and trust, contact them directly to confirm its legitimacy before scanning.
- Do not use codes from unsolicited sources. Don't respond to unsolicited contact, such as phone calls or texts.
- Use MFA. Use strong passwords and enable two-factor authentication (multi-factor authentication, or MFA for short) on all your accounts.
- Keep your software updated. Sign up for automatic updates so you don’t overlook when they become available.
For even more guidance and tips about these issues, here are some more of our resources: Visit our webpage; check out our blog; subscribe to our YouTube channel; follow us on LinkedIn.
| |
Quick Hits:
Here are seven more questions we are answering at a high level. We provide more in-depth information and associated details about these topics in separate blog posts, videos on our YouTube channel, in infographics and e-books, LinkedIn posts to our business page, and within our online training and awareness courses.
Q: My personal data was compromised in the huge Ticketmaster hack. What actions should I take to limit the negative impacts to me, and possibilities for identity fraud?
A: This was a targeted attack, and the hackers wasted no time in putting the 1.3 terabytes of data for sale. They will likely sell the data multiple times to get as much money as possible. If you’ve ever gone to a concert, it is likely that your data was part of the 560 million people whose data was stolen. If it has been years since you went to a concert, your data could have still been stolen, and now actively sold to criminals.
- Change your password/PIN. Make it a long, complex (numerals, alpha and symbols), without any words you’d find in the dictionary.
- Turn on multi-factor authentication. This way, even if the crooks have your PIN or password, they still won’t be able to get into your account without your second authentication item.
- For the next several months monitor each of your credit cards to see any purchases you did not make; you can do this through your online credit card portal. If you’ve not set up an account for online access, do it now, and keep an eye on your account.
- Put a credit freeze on your accounts to stop the crooks from opening other financial accounts under your name.
-
Request a copy of your credit report from the credit reporting agencies (CRAs). You can actually request a credit report, for free, once a week for online access from TransUnion, Equifax and Experian. Review them closely.
- Since phone numbers were stolen, you will be a target for crooks making scam calls. Don’t fall for any unsolicited or unexpected calls. If they claim to be from a government agency, law enforcement, or a lawyer, ask them for their phone number and tell them you’ll call them back. Then confirm by checking online and calling the office number listed to see if that phone number given to you actually goes to the organization they claim they are from.
- Be very aware on your social media sites also. Including for friend/link/etc., requests.
- Watch out for too-good-to-be-true and threatening hard copy letters and packages through the postal mail.
- If you believe your card has been used fraudulently, contact the issuing bank as soon as possible.
| |
Q: My new laptop has built-in security software, which is supposed to include pop-up blockers. But I am still getting pop-ups! Why?
A: There are new tactics constantly emerging for getting these pop-ups to be shown to computer users. Some exploit software vulnerabilities, and users who don’t keep their software automatically updated with security patches. Other types of exploits are through apps that people download to their device that disable the pop-up blockers. For example, when you are downloading a new app, and you “accept” all the terms to use the app, without realizing you gave them permission to use pop-ups because you didn’t read the terms. Most people don’t, but need to because these types of surreptitious tricking of users (called “social engineering”) is increasing. There are other ways, but these two are probably the most common.
As we were putting together this month’s Tips, we also received an email from long-time reader, Nancy. She passed along this related advice.
Although I just got a new laptop with pretty protective software, I was hit with a "malicious pop-up." The software gave me a very simple tutorial on what to do when that happens.
It was basically:
- DON'T CLICK! (I knew that already)
- Disconnect from Wi-Fi immediately
- Shut down and seek professional help (or, if you have the skills, clean out your cookies, cache, and other places those evil sprites could be hiding)
Thank you, Nancy! Some good advice. We would make an edit for item #3. Instead of seeking professional help, if you have anti-malware software loaded, and keep it up-to-date, most will perform these types of actions for you without needing to call someone. Check to see if your anti-malware package has this capability. If it doesn’t, consider getting a replacement package that does.
| | |
Q: A local news report said to beware of scams involving cryptocurrencies, since they were on the rise. What does that even mean? I don’t understand.
A: Cryptocurrency (often called crypto for short) is a type of digital currency. It generally exists only in electronic form. Typically, phones, computers, or a cryptocurrency ATM are used to buy cryptocurrency. Bitcoin and Ether are a couple of the best-known cryptocurrencies, but there are many others.
Here is something important to know before you start using cryptocurrency: cryptocurrency held in accounts is not insured by a government like U.S. dollars deposited into an FDIC insured bank account. So, if something happens to your account or cryptocurrency funds the government has no legal obligation to help get your money back. Many people have lost huge amounts of money after the companies that provided storage for cryptocurrency wallets went out of business, was hacked, or some other event happened that made the digital money disappear. Scams involving cryptocurrencies are increasing.
Here a few ways to help protect your cryptocurrency.
1. Beware of investment scams. Investment scams are the number one area where crypto users are losing the most money; $575 million between 2021 and 2022. This typically occurs when a cybercrook randomly contacts (via social media, phone, etc.) a targeted victim, makes promises of huge returns on money, then takes the victim’s money without making the promised investment, and the victim never hears from the crook again.
2. Never send money to someone you have not met in real life. Romance scams totaled more than $185 million in crypto losses from 2021 to 2022, and that figure has likely gone up in more recent years. Romance scammers often ask their targeted victims for money through using cryptocurrencies to finance things like hospital bills, essential traveling or general bills that are fraudulent. Cryptocurrencies are non-refundable, and you cannot stop a payment once it has gone through, so never send any money to a source you cannot verify is trustworthy.
3. Do not participate in pump and dump schemes. This type of scam works by artificially raising the price of a stock, or cryptocurrency, by increasing its popularity. The scammers will then tell you to invest in it. However, insider scammers will have bought this crypto before you were involved and sell it off to you during this initial ‘pump’ to make a profit. The scam then works as you are unable to make a profit after this initial surge in price as the value quickly crashes and you are told you were not fast enough selling your share.
4. Always check the source of who contacted you. Imposter scams lost US citizens over $752 million last year, with $133 million being crypto losses. It is critical to check the details of those contacting you regarding payments. Cybercrook imposters often pretend to be from a company or government body, demanding you send them money or you will face serious consequences. The FTC, and all other government agencies, will never harass you or demand that you pay them money directly.
5. Do not fall for extortion scams. Most Americans are now on some form of social media, making it is very easy to be targeted by fake individuals. Criminals will claim to have information they can use to extort money from you with (which they usually do not have), which is a serious offense and should be immediately reported to the police.
| |
Q: I received an unusual email. I don’t know anyone with this name or email address. Is it a legitimate? I’d love to have a free piano! -Bill
A: The email Bill received is shown below. Many cybercrooks who go phishing for victims first put out an exploratory type of email message to tens of thousands of email addresses, usually from huge databases of email addresses they purchased in the dark web, hoping they will get even a small percentage to engage with them. Those that respond then become their targeted phishing victims. Phishing crooks love to use Gmail.com domains; they are used in 91% of phishing emails. If you get an odd, unsolicited email from someone you’ve never heard of before, offering you something valuable for free, and you are tempted, just stop and remember…if something is too good to be true, it probably is! Especially if it is an offer to get something for free, coming from an email address where the name portion has no resemblance to the part of the email address in front of the @ sign, with a gmail.com domain.
| |
Q: We are preparing for a vacation in August. A road-trip across several different states. What security and privacy actions should we take?
A: Important information to know! Thank you for the question. We answered a similar question in our August, 2023 Tips issue. Your question motivated us to update the answer. Before going on a vacation, business trip, or any other type of overnight travel, besides doing all your other regular trip preparation, include doing privacy and security actions before you leave. Then, stay privacy aware and cybersecurity smart during your trip. Businesses also need to ensure their workers travel safely. Organizations providing meeting facilities also need information about ensuring security and privacy for their those attending the meetings. You can see our checklist of actions to take here.
Q: With increasingly more cloud services being targeted by hackers and experiencing data breaches, we’re looking at creating our own backups to keep the data under our control. What type of media do you suggest? Is using tape for storage still a thing? Is it secure?
| |
A: We admire how you are being proactive to better protect your data. And this is a great question, with all the possible types of media that can be used. Regarding tape storage, many readers may think tape stopped being used decades ago; surprise! It is still being used. Indeed, it is actually experiencing a growth in use in recent years.
A wide range of backup media is utilized by all sizes of organizations, and by individuals. The most popular are (in no particular order):
- Tape: Tape backup can range from half-inch reel tapes for legacy systems to Digital Linear Tape (DLT), which is most commonly used today. Users can buy DLT drives as simple desktop or standalone models that can be directly connected to computers. Some also come as massive, robotically sorted tape libraries that may not require human intervention to sort, catalog, file, and/or retrieve data from.
- External storage drives. Such drives are comparatively small but can store huge amounts of data. They are comparatively inexpensive and it is easy to find retailers selling them. But while they are less expensive and easy to obtain, backing up files on them can often be time-consuming. Use a high-capacity cable to help make the transfer as quick as possible.
- Flash Storage. These are flash drives and thumb drives. They usually connect to the device using USB ports. They are small, so take up little space, but they are also very easy to lose or misplace.
- Card storage. SIM cards, SD cards and micro SD cards. These small cards are susceptible to loss and damage. But they are very cheap, and take up small amounts of room.
- Optical Drives. CDs, DVDs, and Blu-Ray disks typically used for those backing up one or a few computers. They are comparatively limited in storage space. Optical drives and associated media are fairly inexpensive, and easy to connect to computing devices. They are also susceptible to damage and other problems. Usually best for personal, not business, use.
- Hard copies. Yes, paper, or similar types of hard copies. If you have information or images that you do not want to lose to technology problems or simply aging out of supporting devices that the media can be used in, consider printing out the information and storing in a secure, environmentally-protected, place. For example, digital photos, financial documents, tax returns, wills, etc. can all be on printed paper.
Whatever type of media you use, the security of it will depend upon a few key considerations:
- Is the digital data encrypted? That provides the most security against unauthorized access to the data.
- Do you regularly test portions of the media to see if it can successfully be restored? If the backup was compromised during the backup, it could result in portions, or all, of the data being irretrievable. Test a portion of each backup immediately after each backup is made (this can typically be automated). Then, test each backup media each month, quarter, bi-annually, etc.; more often for the more critical backups.
- Is the media stored where it will not be physically damaged, and can only be accessed by authorized people? If the media is damaged, it will likely not be usable. And if it is stolen, you no longer have a backup of data from the associated point in time to use if and when it is needed.
We strongly suggest you make an inventory of all your backups, to more easily and quickly find specific media when needed.
It is important to understand that when backups are stored in cloud services, they, too, are storing backups on one or more of the previously listed data storage media possibilities. If you use cloud backup services, be sure to ask them about the types of media they use, and how they are securing that media.
Q: I have been the Physical Security Manager for five years for a medium-sized construction supplies company based in the U.S. Last year I was tasked with also being responsible for data and computer security, and my title was changed to Security Manager. When my title and responsibilities changed, I created some security policies for our business, which was also a requirement from some of our business clients. One of our business clients asked us to fill out a questionnaire about our cybersecurity program. One of the questions has me stumped; it asks, “How often do you review your business’s data and cyber security policies and procedures?” Can you help me understand what they are looking for?
A: Most data protection (aka privacy) laws, regulations and other legal requirements are related to managing information security and privacy program. These typically include requirements for how often the security and privacy policies must be reviewed and updated. The most common requirement is to review them at least once every year and update as necessary when major organizational changes are made, such as acquiring, merging with, other organizations, divesting portions of the organization, implementing new systems and applications, expanding or eliminating services and products offered, changing facilities, using new types of technology, etc. Generally anything that could have an impact on security, privacy, or compliance.
That question is most likely being asked to learn whether or not your organization is reviewing and updating your policies and procedures often enough to account for all these types of situations, as well as to meet any legal requirements. For example, most financial industry regulations require their covered entities (CEs) and their associated service providers to review and update, as appropriate, their policies and procedures at least annually. Make sure to retain all versions of policies and procedures a specified length of time from when they were last used to comply with your applicable legal requirements. For example, under HIPAA, healthcare covered entities (CEs) and their business associates (BAs) must retain policies and procedures for six years after they are last used.
| |
Data Security & Privacy Beacons*
People and Places Making a Difference
| |
We get many suggestions for beacons from our readers and Rebecca’s podcast/radio show listeners; thank you! We include many of them when the suggestions are for businesses other than the suggester’s. Typically for those the suggester feels deserve recognition for noteworthy data security and privacy actions. However, we do not include businesses, organizations, or people trying to promote themselves to get free marketing, and we do not take payments to put organizations or people on this list. We try to contact as many as possible after publishing our Tips to let them know we put them on our beacons list, though. If you have someone or an organization to suggest, let us know! We may include them in an upcoming Tips issue.
| Source: Scene from Season 7, Episode 9 of The Office. | |
-
Dr. Cheryl Cooper. For her awareness efforts.
-
Dr. Mich Kabay for his new book, “The Expert in the Next Office: Tools for Managing Operations and Security in the Era of Cyberspace (routledge.com). I had the honor of reading a pre-publication copy; it is great!
-
George V. Hulme, at SC Media. For an informative article, “Impact of cybersecurity organizational structure on ransomware outcomes: The most successful models.”
-
IANS. For “Empower the Business to Use GenAI in Customer-Facing Applications.” There are many AI papers being published. Few give truly succinct, actionable advice to businesses about the cybersecurity and privacy issues. I was a peer reviewer and contributing author for this paper, along with fellow IANS faculty Jake Williams (lead author) and Aaron Turner (peer reviewer and contributing author). We’ve received many thanks from businesses for the advice. I hope, dear readers, you also find it useful for your business.
-
Season 7, Episode 9 of The Office. For the scene about guessing the password to the company server. Thanks to Gil for suggesting this.
-
Advanced Research Projects Agency for Health (ARPA-H). Part of the US Department of Health and Human Services (HHS) Office of Civil Rights (OCR), on the launch of Universal PatchinG and Remediation for Autonomous DEfense (UPGRADE) program, a cybersecurity effort that will invest more than $50 million to create tools for information technology (IT) teams to better defend the hospital environments they are tasked with securing.
-
Rupert Goodwins. For his insightful opinion in The Register, “You want us to think of the children? Couldn't agree more. But breaking E2EE and blanket bans aren't thinking at all.”
-
HHS OCR. For their newly published guidance, “OCR Updates Change Healthcare Cybersecurity Incident FAQs.”
| |
*Privacy Beacons do not necessarily indicate that an organization or person is addressing every privacy protection perfectly. It simply highlights a noteworthy example of privacy-aware practices. | |
Where to Find The Privacy Professor | |
We are proud to announce that Rebecca was the highlighted alumna of the 1st quarter issue of one of her alma maters, the University of Central Missouri (UCM), where she graduated Summa Cum Laude with B.S. degrees in Mathematics and Computer Science. You can see what they wrote, and her 7 tips to help prevent being a victim of cybercrime here.
Rebecca’s article, “Best practices for securing critical and public infrastructure,” was published in Security Magazine.
Rebecca provided insights to Cam Sivesind’s SecureWorld article, “The Promise and Perils of AI in Healthcare.”
On June 6 at 4:00 PM Eastern, Rebecca will be a panel member and moderator for the Identity and Access Management Solutions Review Mini Jam Live Session, "Passkeys: The Great Password Killer." Is it really? We shall discuss! It will be an interesting and insightful conversation. With fellow panel members Chase Doelling, Jay Reddy, Kayne McGladrey, Pedro Martinez, and Stuart Wells. The session is free and will be available afterwards on LinkedIn and YouTube.
On August 28, Rebecca will provide the ending keynote for the SecureWorld virtual Manufacturing & Retail conference. Her talk is titled, “Navigating the Future: Privacy and Cybersecurity Challenges in the Era of an All-Connected World.” Use this link to register for free and get 6 CPEs:
https://www.engagez.net/sw-manufacturing-retail-2024#lct_last=lobby&lct=entrance
| |
On May 1, Rebecca gave the opening keynote for the 2nd Annual SecureWorld Healthcare Virtual Conference. Titled, “Navigating the Future: Privacy and Cybersecurity Challenges in the Era of Smart Medical Devices.” If you missed it, you can still register for this free event, and watch the recordings of the talks, which will be available until August 1. CPEs will also be given for watching the event.
Announcement! Plan now to attend Rebecca’s 2-day course with EPIC live, online training November 21-22. “Cybersecurity for Engineers and Technical Professionals.”
| |
Permission to Share
If you would like to share, please forward the Tips message in its entirety. You can share excerpts as well, with the following attribution:
Source: Rebecca Herold. June 2024 Privacy Professor Tips
www.privacysecuritybrainiacs.com.
NOTE: Permission for excerpts does not extend to images.
Privacy Notice & Communication Information
You are receiving this Privacy Professor Tips message as a result of:
1) subscribing through PrivacyGuidance.com or PrivacySecurityBrainiacs.com or
2) making a request directly to Rebecca Herold or
3) connecting with Rebecca Herold on LinkedIn.
When LinkedIn users invite Rebecca Herold to connect with them, she sends a direct message when accepting their invitation. That message states that in the spirit of networking and in support of the communications that are encouraged by LinkedIn, she will send those asking her to link with them her monthly Tips messages. If they do not want to receive the Tips messages, the new LinkedIn connections are invited to let Rebecca know by responding to that LinkedIn message or contacting her at rebeccaherold@rebeccaherold.com.
If you wish to unsubscribe, just click the SafeUnsubscribe link below.
| | | | |