-
David Eves wrote a new post on the site MIS5208 Spring 2017 7 years, 7 months ago
This article projects that – as technology grows within the household (smart TVs, smart phones, watches, appliances, etc.) – the targets for ransomware attacks will be move from big business to John Q. Consumer. […]
-
David Eves wrote a new post on the site MIS5208 Spring 2017 7 years, 7 months ago
I thought the tone of this article was interesting, as it seems that companies are turning to AIs in terms of cyber security. Amazon is now using a recently acquired AI platform to assist in its cyber security […]
-
David Eves posted a new activity comment 7 years, 8 months ago
James: great article, and I read up on some of what this touches on last week in article I posted that talked about how most credit unions have smaller IT units, and therefore cyber security is that much more challenging. Did you used to work at a credit union? I am curious as to how the dynamic looks for a company that desperately needs (whether…[Read more]
-
David Eves wrote a new post on the site MIS5208 Spring 2017 7 years, 8 months ago
I came across this article and felt that it was a very unique, comprehensive “handbook” on how to secure an organization, based on the lessons learned from the never-ending Yahoo breach, and Target’s. It showe […]
-
David Eves wrote a new post on the site MIS5208 Spring 2017 7 years, 8 months ago
This article dives into social engineering and what we discussed in last week’s lecture. It shows how most companies underestimate how effective social engineering can still be, despite excessive training. M […]
-
David Eves wrote a new post on the site MIS5208 Spring 2017 7 years, 8 months ago
I thought this was a good article coming off of the discussion we had last week in terms of just how much of your personal data is out there (amongst others) that is being used by companies. Vice president and […]
-
Good Post, David. Regarding this statement “The challenge with big data is not the data. There is plenty of data. The challenge with big data is developing a set of meaningful use cases that address key business challenges.” I believe that one of the biggest challenges with big data is the quality of that data. Dirty data costs companies in the United States $600 billion every year. Common causes of dirty data that must be addressed include user input errors, duplicate data, and incorrect data linking. In addition to being meticulous at maintaining and cleaning data, using IT techniques and big data algorithms can be used to help clean data.
-
-
David Eves wrote a new post on the site MIS5208 Spring 2017 7 years, 8 months ago
I chose this article because it is a great example of how a lack of controls can get overlooked when an organization thinks “nothing is wrong.” Here is a guy who is the associate athletic director at the Uni […]
-
It seems like these days, especially universities, have no controls whatsoever within their Athletic Departments. Whether it is spending, or making sure the athletes are still students, attend their own classes, (it has been reported that universities look the other way to students taking classes for athletes) there is a lack of controls across the board. I believe, and I know this is not related to the class as well, but controls can be augmented not just for data and businesses, but also disciplinary and operational purposes for people.
-
-
David Eves wrote a new post on the site MIS5208 Spring 2017 7 years, 8 months ago
Many small businesses who do not have access to the vast resources that larger businesses do will face similar challenges to the one that “Phoon Huat,” faced (and is still facing), as the baking supply company out […]
-
David Eves commented on the post, Is Outsourcing The Key To Data Analytics Success?, on the site 7 years, 8 months ago
Blake: this article is right in line with one I posted last week, and I couldn’t agree more. Sean makes a great point, and I originally agreed, but after I thought about it further, I started wondering: these “data companies,” wouldn’t they be the equivalent to buried treasure vs a bank robbery for criminals? What I mean is, imagine that one of…[Read more]
-
David Eves wrote a new post on the site MIS5208 Spring 2017 7 years, 8 months ago
I know that this goes back to Week 2, but with all the talk about how organizations (and people) have almost become numb to the idea of being breached, I thought this article was a good indicator of why that is, […]
-
David Eves commented on the post, “Does Open Data Really Empower Consumers?”, on the site 7 years, 8 months ago
Adam: I enjoyed the article and I think it does a great job of showing the other side of the coin to what we were discussing the prior week. Data does empower consumers, as long as they know how to read it. I thought the article revealed how much good can come from data, and how effective and efficient it can make a company. However, I am inclined…[Read more]
-
David Eves wrote a new post on the site MIS5208 Spring 2017 7 years, 8 months ago
I found this article while searching for something on NIST, and I felt that it was rather refreshing in terms of the message it was trying to convey. With all the buzzwords and breach horror stories, it’s easy f […]
-
David Eves wrote a new post on the site MIS5208 Spring 2017 7 years, 8 months ago
I came across this article and was actually rather shocked after reading it despite what we have been discussing over the past three weeks. This venture capital company called “Blumberg Capital” conducted a sur […]
-
Great post David!
In fact there is a lack of awareness. People don’t know how crucial it is to protect their information and/or the information of a company. Also, most of them think it will never happen to them. Frankly, I think that we did not yet understand the downsides of technology.
-
Great post!
I also read an article that contradicts yours a little. The article I read conducted a survey and found out that a large percentage of companies are fully aware of cyber threats and its consequences but more than half of them are not prepared or invested enough is cyber security.
-
-
David Eves posted a new activity comment 7 years, 8 months ago
Priya: great article, and it’s right on pace with the readings from this week. Fraud prevention / detection is a team effort, and even though that technically falls on Management, it is only as effective as the culture that management, upper management and Internal Audits creates.
We talked about this other week and in class, and I think it g…[Read more]
-
David Eves wrote a new post on the site MIS5208 Spring 2017 7 years, 8 months ago
I chose this article because I thought it was an interesting takeaway from the Anthem breach of 2015. The first point really caught my attention because one would think communication is key in a breach. Anthem […]
-
Thanks for shaving your takeaway from anthem breach. This article reminds me that 2 years ago, my friend got a fake email from PayPal saying that “sign up for this and you will get 5$ credit in your PayPal account. He did that and he told me to do so but I refused. He ended up didn’t get the five dollars and he contacted PayPal customer service. Paypal said it never had a promotion like this. I think that his account information has been stolen but so far nothing happened to him yet.
When we receive some article/promotion in email, we need to make sure the email address is the correct and verified address. Most of the times, it contained a link that directs us to a virus-infected website. Fake email sent from a fake email is easy to identified just by paying more attention to the email address.
-
-
David Eves posted a new activity comment 7 years, 9 months ago
Darin: the article does a perfect job of illustrating how good cybersecurity is constantly in quality control – meaning it needs to be updated and reevaluated as often and consistently as the attacks / issues it defends against, if not, more. I especially liked the part about the more technological controls put in place, the more employees will s…[Read more]
-
David Eves posted a new activity comment 7 years, 9 months ago
Sarush: I liked this article because – as you stated – it ties right in to our IT Governance portion of the lecture. A company’s internal controls, regardless of spending, are only as strong as the “tone from the top.” This direction from senior management (whether a steering committee, BoD or an Audit committee) really dictates how much fraud wil…[Read more]
-
David Eves posted a new activity comment 7 years, 9 months ago
Mustafa: I think this is the culture that we live in right now. Just like many organizations assume they will have their security compromised at some point, many people have that same belief when it comes to their own data. It is funny to think that many organizations have strict password requirements that are updated often, and many employees…[Read more]
-
David Eves posted a new activity comment 7 years, 9 months ago
Sean: I couldn’t agree more – when I was reading it, it felt as though the “promise” of big data was like the promise of the 1080P HDTV several years ago. The technology was there, and you could “buy an HDTV” but the signal coming to that TV would only be 720P. So you were buying an idea for the future. I don’t think it’s a question of big…[Read more]
-
David Eves wrote a new post on the site MIS5208 Spring 2017 7 years, 9 months ago
I chose the following article because I thought it would be a good conversation piece given what we discussed in our lecture this past Saturday. Basically, the article is claiming that “big data” isn’t all it wa […]
- Load More
As we (society) continue to grow in our dependence on technology and connectivity, end users must evolve in our ability to safeguard ourselves from cyber criminal attacks. I am not sure the common users are educating themselves to the vulnerabilities that exist. It seems creating personal resiliency and backup plans would lessen the impact of ransomware attacks. Although I consider myself to be a moderately educated on the perils of cyber attacks, however I cannot claim that I feel safe from possible attacks. Maybe I am ‘old school’ but I still like to maintain my own backups in addition to my automated cloud backups.
Very good article. Unfortunately, I suspect as stated in the article, the common user will experience more and more grief from breaches on their personal data.