-
Joshua Tarlow posted a new activity comment 8 years ago
Another reminder of how inadaquete cyber security is for healthcare organizations. Hard to believe that anyone is still using pagers. and not to mention for an organization that has a lot of sensitive data.
-
Joshua Tarlow posted a new activity comment 8 years ago
I think that Tesla was the first car manufacturer to deliver software updates remotely. While convent, can make the car vulnerable to cyber threats. On the other hand, it allows Telsa to push out security updates very quickly as opposed to having to do a traditional recall. While there are always going to be cyber security issues with cars, and…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
“HACKING, CRYPTOGRAPHY, AND THE COUNTDOWN TO QUANTUM COMPUTING”
The article I chose is about the threat of quantum computing to current encryption methods. At the moment, strong encryption is one of the best cyber security tools available, and most available computing power are nota able to break strong encryption. Computers attempt to break…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
I mentioned their app in my first post. Great example of OTC process. Extremely easy to order and pay before every setting foot in the door. Also significantly reduces the wait time, sometimes I’ve gotten there and it’s ready, which couldn’t be more convenient.
-
Joshua Tarlow commented on the post, Weekly Question #8: Complete by November 2, 2017, on the site 8 years ago
I really like their process too. They are able to process a large number of customers efficiently and I’ve never waited there too long, regardless of how long the line was. Having the customer order on a computer helps the process because less employees need to take orders, and it is less expensive to buy additional computers. Allows the employees…[Read more]
-
Joshua Tarlow commented on the post, Week 4 Questions, on the site 8 years ago
Definitely agree that this part of the process is very susceptible to fraud, and Wells Fargo is a great example. I would be interested to see more information about the internal controls that were used. Clearly the employees felt pressure, and many employees independently exploited the same gap in internal controls. The accounts were most likely…[Read more]
-
Joshua Tarlow commented on the post, Weekly Question #8: Complete by November 2, 2017, on the site 8 years ago
I also like they refund process. Online vendors have an inherent disadvantage relating to returns/refunds. However, Amazon is able to make the process more convenient than many vendors with physical locations. The drop of locations are definitely easy to use. Printing off the the shipping label is very easy, and can be shipped at any UPS location.…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
I actually really like PayPal too. Took me a while to appreciate it and only really used it for Ebay purchases until the past couple years. For one, it’s definitely more convenient than having to reenter a credit if there is a PayPal link on the site. And it does seem to be one of the more secure platforms from what I’ve read. They do have good…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
What are the security challenges in online banking?
Online banking offers benefits to both banks and their customers. Banks can offer more services with greater availability with less resources. Customers gain added convenience and availability to their money. Many transactions that used to require visiting a local bank branch to complete can…[Read more]
-
Joshua Tarlow commented on the post, Week 4 Questions, on the site 8 years ago
Definitely agree that Apple Pay does have its risks and some have definitely already been written about. None of the current payment systems are really secure, it’s really more a matter of how good they are comparatively to one another. And hackers will definitely exploit more vulnerabilities in Apple Pay over time, especially if becomes more…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
Operating systems are vulnerable to external and internal risks. Internal control issues can be employees accessing sensitive information that they do not have a need to know. For example, a marketing employee accesses payroll data restricted to HR. Or an employee at a healthcare company accesses patients healthcare data, which would violate…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
Why is so important to protect operating systems?
An operating system is the most important software on a computer and provides the graphical interface that allows users to use the computer. It manages the processes, memory, in addition to all hardware and software. Most operating systems are preloaded in computers because they would be useless…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
I actually think that Apple Pay offers a convenient way to make purchases within Apple’s platform, and is easy to use at retailers when available. For example, my wife uses the Starbuck’s app to purchase coffee at work. Apple Pay allows her to reload funds to her account from her phone. Once a card is stored in Apple Wallet and then linked to…[Read more]
-
Joshua Tarlow's profile was updated 8 years ago
-
Joshua Tarlow commented on the post, Weekly Question #4: Complete by February 15, 2017, on the site 8 years ago
I like that you listed the human factor on your list. Human error is always a risk regardless of how the data is stored. A system may reduce the error, but it is impossible to eliminate completely. I’ve looked throw a lot of DBMS that have errors that were most likely human.
-
Joshua Tarlow posted a new activity comment 8 years ago
Key benefits of relational databases vs traditional file system?
Traditional file systems store data in files, as opposed to a relational database which stores data in tables with rows and columns. As a result, relational databases allow for more sophisticated data organization and retrieval. Key organizational benefits to relational databases…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
“Cyence Raises $40M to Help Insurers Assess Cyber Risk”
The article I chose for this week is about a new firm established to help insurance companies assess cyber risk. Cyber insurance premiums are projected to grow to $7.5 billion annually by 2020 from $2.5 billion in 2015. While this growth is an opportunity for insurers, it also a large risk…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
I agree that two similar companies may have different risk management practices, and there is no one superior strategy. However, there some risk management practices that provide excellent framework/guidelines. For example, transferring risk, or purchasing insurance is sometimes not advisable unless there are regulatory requirements to consider. A…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
The acceptable information system security risk is essential the level or risk that an organization is willing to tolerate. It is impossible to prevent every risk, nor is it feasible to implement every possible control, or risk prevention/mitigation. Therefore it is necessary to allocate resources to the risks with the most probability and/or the…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
My credit cards have also been compromised this year. Feels more and more common place every year. I’ve found it better to use a credit than debit if you’re able to since it doesn’t take money out of your account. That way if there is an issue, don’t have to wait for the funds to be deposited back into your account. I definitely agree that you can…[Read more]
- Load More