Data Breaches Making the Headlines in 2016

We've written about a small business user and his aftermath of Yahoo 1Billion email address data breach.  There were plenty of others.  Here's a summary of some of the other major data breaches in 2016.

980 data breaches occurred in 2016. That left an approximate 35,233,317 known records exposed. Over the years, data breaches have become more sophisticated, and cybercriminals target both large corporations and small businesses.

2016 saw a string of data breaches that left sensitive information of millions of people at the mercy of cybercriminals. In addition to financial consequences, these data breaches ruined customer trust and the reputation of the companies in question.

As we look back at 2016 here are some of the most impactful data breaches that shook the world.

[More]

A Yahoo eMail Hack Victim

Nearly every day, we read scary stuff regarding the Yahoo email hack last December. In these pages, we try to be careful about “crying wolf” and being overly sensational. However, this story resonates because it could happen to any of us and involves a friend.

Last Friday, a business owner and friend of mine in another part of the US in a non-technology business told me a tale of how an innocuous mistake has spun out control and is threatening the existence of his business.

The mistake was simple – one that many of us could make even though there are plenty of warnings out there. Last Monday, his company sold a multi-thousand dollar item to an individual in Minnesota. Payment had been arranged to be made via wire-transfer. My friend emailed the buyer the wiring instructions including the bank, routing, and account numbers.

[More]

`Twas the Night Before Christmas (Aviation Style)

I know we have a few pilots, "wanna be" pilots and many passengers who read this Blog.  This "takeoff" on the poem `Twas the night before Christmas has been making the rounds of aviation websites and other publications for over 20 years. No one seems to know where it came from. Enjoy ...

 ‘Twas the night before Christmas, and out on the ramp,
Not an airplane was stirring, not even a Champ.
The aircraft were fastened to tie downs with care,
In hopes that -- come morning -- they all would be there.

The fuel trucks were nestled, all snug in their spots,
With gusts from two-forty at 39 knots.
I slumped at the fuel desk, now finally caught up,
And settled down comfortably, resting my butt.

When the radio lit up with noise and with chatter,
I turned up the scanner to see what was the matter.
A voice clearly heard over static and snow,
Called for clearance to land at the airport below.

[More]

Top Read eNews Blog Entries for 2016

It's always interesting and fun to look back on which Blog entries had the most views at the end of the year. Doing that gives us some idea what everyone is reading and helps us plan the content for the next year. Of course, there will also be plenty of material that "hasn't been invented yet" that we'll report on in 2017!.

Our eNews Blog content comes from The Computing Center staff, several of our manufacturer partners, and from assorted friends and other writers who make their content available to us to publish here. 

So, how did we do with you, our readers? Here are the Top 5 most viewed (and we hope read) Blog entries during the last 12 months:

[More]

Don't the Grinch Steal Your Identity

Tis the season. Lots of online shopping. Lots of in-person shopping. Lots of travel. All opportunities to have your identity stolen. Here are some basic tips to hand on to your identity so the bills you receive in January are for the items you actually purchased!

The holiday season is a time of merriment for one and all. That includes scammers, fraudsters, and thieves too. It’s the best time of the year for them to do their worst.

More people will be shopping, partying, traveling, and generally letting their guard down. This gives these criminals an avenue to unleash the Grinch in them.

As the years roll by, holiday-related crimes have evolved. Petty thieves who were once satisfied with pickpocketing or stealing a carelessly placed shopping bag have grown into more complex identity thieves. The few dollars in your wallet have little or no value to these criminals. However, your driver’s license, SSN, debit cards, and credit cards have far more value than you can imagine. The underground economy is a thriving playground for identity thieves.

[More]

Previous Entries / More Entries