Security Fatigue Leads to Reckless Computing Behavior

Oct. 4 — Risky and reckless computing behavior happens when computer users grow weary of dealing with computer security, according to an Oct. 4 study by the National Institute of Standards and Technology. When users have to make more computer security decisions than they can manage, “they experience decision fatigue, which leads to security fatigue”—weariness or reluctance…

Cyber warfare: Who is China hacking now?

Hong Kong (CNN)- It’s the nagging glitch in the US-China relationship that was inevitably mentioned during the first US presidential debate this week between Donald Trump and Hillary Clinton — cyber warfare. During the debate, Trump questioned whether Russia was indeed behind a series of cyberattacks on the Democratic National Committee — a conclusion that US…

Cyber security: It’s not just about Yahoo

It’s not surprising that some Yahoo users have decided to sue the company for negligence over a 2014 breach that was only recently discovered and announced. But before we blame Yahoo for this, we need to understand how hackers accomplish such breaches — and what all of us should be doing better to prevent such breaches.…

Bring Home the Data? New Hong Kong Data Privacy Guidelines for BYOD Policies

On Aug. 31, the Hong Kong Privacy Commissioner (PC) issued a new Information Leaflet to highlight the personal data privacy risks that employers need to address when developing a Bring-Your-Own-Device (BYOD) practice. This new Information Leaflet has been issued against the backdrop of increasing cybersecurity concerns, particularly in the financial industry. Cybersecurity Risks BYOD practices are not…