David Eves

  • I am sure this will be the first of many controversial policies passed / revoked, but I wanted to share the article because the info being shared is big data 101. Basically, internet customers will now have their […]

    • David,

      I’m not honestly not suprised whatsoever. I just wanted to include that the actions that were protected under the Obama Admin were to prevent companies from:
      – selling your data to marketers
      – highjacking searches
      – snooping thought internet traffic to insert ads
      – pre-installing software on your phone and recording your activity
      – injecting undetectable, undeletable tracking cookies in all of your unsecured web traffic

      Regardless of which side of the party someone falls on, the internet has been turned over to ISPs; thus, stripping away the few rules that protected our privacy. Subsequently, this repeal also means that ISPs are not required to alert you of potential data breaches and take reasonable measures to protect our user data.

      Great, post and sadly, I do not think this will be the only bill passed hindering our data.

    • Magaly: I think you are right, and it may only get worse from here on out. The one thing I was curious about, though, is how does this affect companies that allow employees to “connect” from home? I say connect, because “work” from home usually requires a VPN, but connecting (whether via email, or messenger or applications) would all now be subject to the data that is gathered / turned over to the highest bidder by your ISP. I could be wrong (and I hope I am misinterpreting this), but if I am not, I am curious to see how this effects business.

    • I am pretty disturbed by this. I don’t even like that the ISP stores our history, and now they can sell it without our permission. VPN’s aren’t a bad idea, but what will happen when the VPN decides to sell your data? They also won’t protect you from tracking by google or facebook.

  • David Eves posted a new activity comment 1 month, 3 weeks ago

    Darin: really good article, and – although it was surprising – it really shouldn’t come as a shock when you consider what “benefits” are associated with this information. I think it gets overlooked because of the decentralized and indirect impact, i.e. discounts on goods, free access to paid / licensed programs, etc. There really isn’t a true doll…[Read more]

  • Magaly: thanks for the heads-up. As a chrome user, I have yet to see this, but I did find it interesting that the chrome browser doesn’t flag it as malware – I wonder why that it is? I was a little confused by that end of that author’s sentence though: “the browser does block it because the file is not downloaded too often, which is a standar…[Read more]

  • This article was a Q&A with a health data security expert named Mac McMillan – the CEO and co-founder of CyngergisTek Inc. – and it addressed some interesting topics in terms of the future of cybersecurity. One […]

    • Hey David, I actually read that article and really liked the concept of behavioral technologies. Like, old systems don’t discover identity theft by authorized users. People dont usually think about these things but they can make a difference, especially in the cyber world. Behavioral technologies are based on behavior analysis, which is pretty much all about understanding common user behaviors. As I mentioned in one of my previous post, humans are creature of habits so managers must use deeper analytics to monitor them. Having a baseline understanding of typical user behavior is essential because of possible malicious insiders and even compromised credentials of legitimate users are significant threats.

  • I found this article and thought it was an interesting take on how advanced cyber security threats can only be defended against if man and AI work together (not one or the other). The article explains that the […]

    • Great post David. It really make sense because when you think about it algorithms can make systems smarter, but without adding a little common sense into the equation they can still produce some pretty bizarre results. That’s why human intelligence is also necessary. Combining human analysis and machine data mining will allow to obtain credible data relations.

  • This article projects that – as technology grows within the household (smart TVs, smart phones, watches, appliances, etc.) – the targets for ransomware attacks will be move from big business to John Q. Consumer. […]

    • As we (society) continue to grow in our dependence on technology and connectivity, end users must evolve in our ability to safeguard ourselves from cyber criminal attacks. I am not sure the common users are educating themselves to the vulnerabilities that exist. It seems creating personal resiliency and backup plans would lessen the impact of ransomware attacks. Although I consider myself to be a moderately educated on the perils of cyber attacks, however I cannot claim that I feel safe from possible attacks. Maybe I am ‘old school’ but I still like to maintain my own backups in addition to my automated cloud backups.

      Very good article. Unfortunately, I suspect as stated in the article, the common user will experience more and more grief from breaches on their personal data.

  • I thought the tone of this article was interesting, as it seems that companies are turning to AIs in terms of cyber security. Amazon is now using a recently acquired AI platform to assist in its cyber security […]

  • David Eves posted a new activity comment 2 months, 3 weeks ago

    James: great article, and I read up on some of what this touches on last week in article I posted that talked about how most credit unions have smaller IT units, and therefore cyber security is that much more challenging. Did you used to work at a credit union? I am curious as to how the dynamic looks for a company that desperately needs (whether…[Read more]

  • I came across this article and felt that it was a very unique, comprehensive “handbook” on how to secure an organization, based on the lessons learned from the never-ending Yahoo breach, and Target’s. It showe […]

  • This article dives into social engineering and what we discussed in last week’s lecture. It shows how most companies underestimate how effective social engineering can still be, despite excessive training. M […]

  • I thought this was a good article coming off of the discussion we had last week in terms of just how much of your personal data is out there (amongst others) that is being used by companies. Vice president and […]

    • Good Post, David. Regarding this statement “The challenge with big data is not the data. There is plenty of data. The challenge with big data is developing a set of meaningful use cases that address key business challenges.” I believe that one of the biggest challenges with big data is the quality of that data. Dirty data costs companies in the United States $600 billion every year. Common causes of dirty data that must be addressed include user input errors, duplicate data, and incorrect data linking. In addition to being meticulous at maintaining and cleaning data, using IT techniques and big data algorithms can be used to help clean data.

  • I chose this article because it is a great example of how a lack of controls can get overlooked when an organization thinks “nothing is wrong.” Here is a guy who is the associate athletic director at the Uni […]

    • It seems like these days, especially universities, have no controls whatsoever within their Athletic Departments. Whether it is spending, or making sure the athletes are still students, attend their own classes, (it has been reported that universities look the other way to students taking classes for athletes) there is a lack of controls across the board. I believe, and I know this is not related to the class as well, but controls can be augmented not just for data and businesses, but also disciplinary and operational purposes for people.

  • Many small businesses who do not have access to the vast resources that larger businesses do will face similar challenges to the one that “Phoon Huat,” faced (and is still facing), as the baking supply company out […]

  • Blake: this article is right in line with one I posted last week, and I couldn’t agree more. Sean makes a great point, and I originally agreed, but after I thought about it further, I started wondering: these “data companies,” wouldn’t they be the equivalent to buried treasure vs a bank robbery for criminals? What I mean is, imagine that one of…[Read more]

  • I know that this goes back to Week 2, but with all the talk about how organizations (and people) have almost become numb to the idea of being breached, I thought this article was a good indicator of why that is, […]

  • Adam: I enjoyed the article and I think it does a great job of showing the other side of the coin to what we were discussing the prior week. Data does empower consumers, as long as they know how to read it. I thought the article revealed how much good can come from data, and how effective and efficient it can make a company. However, I am inclined…[Read more]

  • I found this article while searching for something on NIST, and I felt that it was rather refreshing in terms of the message it was trying to convey. With all the buzzwords and breach horror stories, it’s easy f […]

  • I came across this article and was actually rather shocked after reading it despite what we have been discussing over the past three weeks. This venture capital company called “Blumberg Capital” conducted a sur […]

    • Great post David!

      In fact there is a lack of awareness. People don’t know how crucial it is to protect their information and/or the information of a company. Also, most of them think it will never happen to them. Frankly, I think that we did not yet understand the downsides of technology.

    • Great post!

      I also read an article that contradicts yours a little. The article I read conducted a survey and found out that a large percentage of companies are fully aware of cyber threats and its consequences but more than half of them are not prepared or invested enough is cyber security.

  • David Eves posted a new activity comment 3 months, 2 weeks ago

    Priya: great article, and it’s right on pace with the readings from this week. Fraud prevention / detection is a team effort, and even though that technically falls on Management, it is only as effective as the culture that management, upper management and Internal Audits creates.

    We talked about this other week and in class, and I think it g…[Read more]

  • I chose this article because I thought it was an interesting takeaway from the Anthem breach of 2015. The first point really caught my attention because one would think communication is key in a breach. Anthem […]

    • Thanks for shaving your takeaway from anthem breach. This article reminds me that 2 years ago, my friend got a fake email from PayPal saying that “sign up for this and you will get 5$ credit in your PayPal account. He did that and he told me to do so but I refused. He ended up didn’t get the five dollars and he contacted PayPal customer service. Paypal said it never had a promotion like this. I think that his account information has been stolen but so far nothing happened to him yet.

      When we receive some article/promotion in email, we need to make sure the email address is the correct and verified address. Most of the times, it contained a link that directs us to a virus-infected website. Fake email sent from a fake email is easy to identified just by paying more attention to the email address.

  • Load More
Skip to toolbar