I forgot about my TV station tour. Facebook did not forget.
Facebook acknowledges recording It is not a secret. We share more information at Facebook than at most other online services. Sometimes we forget how much we share and that what goes online never really leaves online. I asked Facebook to export my personal information back on December 28, 2019. Their report read like the most thorough diary every compiled. "Thanks Mark. I now see how they are collecting too much information about us. I am calling my Congressman. That Zuckerberg guy better fess up to what he is doing." I know you are thinking that. Read the Terms of Service Actually, Facebook CEO Mark Zuckerberg has been called into the Principal's Office twice. He testified on April 10, 2018 and October 23, 2019. Congress asked if users could protect ... Read More
September 24, 2024Mark Anthony Germanos
Facebook's Mark Zuckerberg monetizes the personal information you shared.
What Facebook knows is a result of what you have shared, and done, on Facebook When we create that first Facebook account and go through the profile creation wizard, we can hardly see 10 feet ahead of us. We get a smorgasbord of questions Where and when born? Grade school? Education achieved? High school?' College? Marital status? Spouse name? Where you work or have worked? Then we get to the most dangerous ones. Get ready: Political views Religious views. I wisely answered the dangerous ones. I wrote "Everybody vote for me" and "Everybody worship me." Wise before my time, I suppose. You are the product I challenge you to look at your profile and see what information you are sharing. Remember Facebook is packaging this and selling it to ... Read More
September 24, 2024Mark Anthony Germanos
Tell Facebook you went to Michigan State and you will get ads for a Michigan State University-branded MasterCard.
Are you using Facebook because it is free? How much are you paying to use Facebook each month? “Haha Mark, trick question,” you may say. "It's free. I am paying nothing.” I beg to differ. You are paying with your personal information. Let me introduce Tanya, one of my fellow Michigan State University alums. I found her on Facebook. I sent a friend request and she accepted within 24 hours. We both told Facebook we graduated Michigan State University. On the UP side, sharing that information helped us connect. On the DOWN side, we shared information Facebook monetizes. Highly targeted and branded MasterCard We both checked Facebook one day and saw ads for a Michigan State University branded MasterCard. The advertisers created the MSU branding and then purchased (or ... Read More
September 24, 2024Mark Anthony Germanos
The California Consumer Protection Act (CCPA) protects Californians' privacy
2-factor Authentication helps protect your identity. You should deploy 2-factor Authentication. This increases your security and reduces your chances of becoming an identity theft victim. Most services encourage 2-factor Authentication and let you deploy it at no additional cost. Here's a quick question for you. When attempting to access a website, the website can challenge you based on: A) What you know (e.g. password). B) Who you are (e.g. fingerprints). C) What you have (e.g. phone). D) All of the above. Correct answer: D. How it looks in real life. Daisy runs a dental office in Folsom, CA. Keeping the practice up and running is her top priority. She runs most of her patient, insurance and vendor communications through her Gmail account. She deploys 2-factor Authentication with the steps at https://myaccount.google.com/signinoptions/two-step-verification/enroll-welcome. She keeps her smartphone nearby. ... Read More
September 17, 2024Mark Anthony Germanos
HP WIFI Password
Did you know your multifunction printer has its own backdoor WIFI? Allen called me one day and said his printer was printing nonstop garbage. He wasn’t printing anything, but somebody was printing through WIFI. This print job was consuming his toner and paper. How did this happen? I told Allen that in addition to joining your multi function printer to your office or home WIFI, you’ll find the printer broadcasts its own WIFI signal. You, or anybody close enough to the printer, can hop on that printer through that WIFI. A hacker could then cause mischief, including changing  the printer’s IP addresses or printing large print jobs that consume paper and toner. I am showing you how to identify your printer’s WIFI, and how to secure it. Assumptions ... Read More
September 10, 2024Mark Anthony Germanos
Protect your patients' charge card and debit card data. Perform PCI-DSS audits annually and vulnerability scans quarterly.
Water utilities are popular targets It wasn't the first time the Fort Collins-Loveland Water District and its wastewater counterpart had been hit by "ransomware," a type of malware that encrypts victims' computer files and demands online payment to unlock them.While operations weren't harmed, the infection prompted the water district to switch out its information technology service provider and call in the FBI. The case, first reported by the Coloradoan, remains under active investigation. FCLWD and the South Fort Collins Sanitation District treat and distribute water to 45,000 customers in northern Colorado.Colorado water officials aren't alone in their cybersecurity woes. The nation's nearly 70,000 water and wastewater utilities are struggling to keep their heads above a rising tide of online threats, based on interviews with security experts ... Read More
September 3, 2024Mark Anthony Germanos
The California Consumer Protection Act (CCPA) protects Californians' privacy
Cyber attacks are dirt cheap Deloitte says the cost of committing a cyber attack is so surprisingly low that anyone can afford to be a bad guy. When you picture a cybercriminal organization today, you should be thinking about a group of individuals who run their operations like a business; concerned with profit and loss, looking for ways to execute as inexpensively as possible, while yielding the largest return. But what you don’t necessarily need to have in that vision is an organization with a large cash reserve. According to Deloitte’s newest report, Black-market ecosystem: Estimating the cost of “Pwnership”, the cost of running a campaign is so low, it’s downright reasonable as a business model for even the smallest cybercriminal business. Some cyber attack examples from the report ... Read More
September 2, 2024Mark Anthony Germanos
Protect your patients' charge card and debit card data. Perform PCI-DSS audits annually and vulnerability scans quarterly.
Healthcare data under attack As the healthcare industry continues to be an attractive target in cyberattacks, the latest data shows that cybercriminals are taking more patient health data than ever. When the number of breaches doesn’t materially change from year to year, it’s a natural assumption that the impact of those breaches is equally similar. According to new data in the 2019 Annual Breach Barometer Report from patient privacy monitoring vendor Protenus, the number of breaches rose from 477 breaches in 2017 to 503 in 2018, with the number of records nearly tripling year over year – from 5.6 million to a little under 15.1 million. With breached records costing healthcare organizations an average of $408, the massive jump in the number of total records breaches incurs a significant cost. Also according ... Read More
August 28, 2024Mark Anthony Germanos