John BandlerBandler’s Three Platforms to ConnectBandler’s Three Platforms to Connect can help organizations manage themselves effectively and efficiently, including with their information…Jun 25, 2022Jun 25, 2022
John BandlerThe Three Priority Cybercrime ThreatsCybercrime threatens every single organization and individual. No business and no individual is immune or invulnerable, we all must…Jul 24, 2022Jul 24, 2022
John BandlerCybersecurity Laws and Regulations (Part 1)This is the first of a two part article which focuses on legal rules relating to cybersecurity. Laws, regulations, and other legal…Aug 3, 2022Aug 3, 2022
John BandlerInternal Rules“Internal rules” describes any rule an organization creates for itself and its employees, and is an important platform for organization…Aug 25, 2022Aug 25, 2022
John BandlerFive Components for Policy WorkI have developed five components for organizations to consider when doing policy work — creating internal rules such as policies…Nov 9, 2022Nov 9, 2022
John BandlerExternal RulesExternal rules are legal requirements such as laws and regulations and come from outside an organization. Organizations need to know what…Dec 3, 2022Dec 3, 2022
John BandlerExternal GuidanceExternal guidance is materials or advice that organizations may consult when creating and updating policies or otherwise seeking to improve…Dec 3, 2022Dec 3, 2022
John BandlerBusiness needs and missionMission and business needs are the top priority for every organization. Mission is one of the Five Components for Policy Work, so let’s put…Dec 3, 2022Dec 3, 2022
John BandlerPractice (action)Practice, or action, is what organizations do. Good organizations do the right thing to accomplish the mission and comply with legal…Jan 9, 2023Jan 9, 2023
John BandlerIdentity TheftIdentity theft and cybercrime go hand-in-hand, so we cannot talk about one without the other. This is an area of self protection…Jan 10, 2023Jan 10, 2023
John BandlerCybercrimeCybercrime is an enormous global illicit economy. We want to protect ourselves, have good cybersecurity, and think about civil and criminal…Jan 27, 2023Jan 27, 2023
John BandlerSextortion and similar cyber extortion schemesSextortion is a type of cybercrime extortion where criminals blackmail and threaten to embarrass the victim, usually to steal money. There…Feb 7, 2023Feb 7, 2023
John BandlerVirtual Currency (including cryptocurrency)I have written, spoken, taught, and developed course material regarding virtual currency, especially as it pertains to cybercrime, money…Feb 10, 2019Feb 10, 2019
John BandlerCybercrime Frauds Involving Email and Funds TransfersCybercriminals are creative, and a rampant fraud to be aware of involves use of compromised or spoofed email accounts. You may see this…Feb 24, 20191Feb 24, 20191
John BandlerNew York Cybersecurity Requirements and the SHIELD ActNew York State’s new law, the SHIELD Act, strengthens data breach reporting requirements and requires “reasonable security”. Here is a…Jan 14, 2020Jan 14, 2020
John BandlerRansomwareRansomware is an innovative scheme within the cybercrime-for-profit economy that has caused vast destruction to governments, organizations…Jan 23, 2020Jan 23, 2020
John BandlerCybersecurity, Privacy, You, and Your OrganizationThis short piece will help you get started and evaluate where you and your organization should be with cybersecurity and privacy. These…Feb 5, 2020Feb 5, 2020
John BandlerCybersecurity and Working from HomeWe are in the midst of a global situation where some businesses are encouraging or mandating their employees to work from home, and some…Mar 6, 2020Mar 6, 2020
John BandlerPolicies, Procedures, and Governance of an OrganizationThis short article introduces good governance principles for organizations, with focus on internal documentation and information…Mar 17, 2020Mar 17, 2020
John BandlerData BreachA data breach is the unlawful access of an organization’s or person’s data. Such breaches can have considerable consequences of a…Nov 23, 2020Nov 23, 2020