About Radnor Reports

Ken Feltman is past-president of the International Association of Political Consultants and the American League of Lobbyists. He is retired chairman of Radnor Inc., an international political consulting and government relations firm in Washington, D.C. Feltman founded the U.S. and European Conflict Indexes in 1988. The indexes have predicted the winner of every U.S. presidential election beginning in 1988, plus the outcome of several European elections. In May of 2010, the Conflict Index was used by university students in Egypt. The Index predicted the fall of the Mubarak government within the next year.

Security breach recovery has a huge price tag

In a recent Kaspersky Labs report: Damage Control: The Cost of Security Breaches, Kaspersky surveyed more than 5,500 companies in 26 countries to determine the cost of recovery from a security breach. Ninety percent of businesses admitted a security incident and forty percent of businesses surveyed lost sensitive data due to an internal or external security threat. On average, enterprises paid $551,000 dollars….

READ MORE

Dissemination of Information in the Cyber Age

Traditionally, most organizations that took part in offensive and defensive operations from a combatant perspective kept vulnerability information within the confines of a need-to-know classification structure. Yet, the concept becomes reversed when dealing with vulnerability information regarding cyber systems. Any individual with access to the Internet can search for these vulnerabilities and find a….

READ MORE

U.S. pulls spies from China after cyber attack

USA director of national intelligence James Clapper has said the U.S. government has yet to figure out exactly who was behind a devastating attack on its government employee vetting department earlier this year.


The Central Intelligence Agency pulled a number of officers from the U.S. Embassy in Beijing as a precautionary measure in the wake of the massive cybertheft of the personal data of federal employees, current and former USA officials said.

While the “common understanding” reached between the USA and China during Chinese President Xi Jinping’s visit last week shows progress, many have cast doubt on the impact it will really have in protecting the U.S.in the ever-changing cyberspace landscape.

China is not the only country to conduct these types of attacks, though it has acted on a much larger scale.

READ MORE

Investor Alert: Identity Theft, Data Breaches and Your Investment Accounts

The SEC’s Office of Investor Education and Advocacy is issuing this Investor Alert to provide investors with important steps to take regarding their investment accounts if they become victims of identity theft or a data breach.

Investors should always take steps to safeguard their personal financial information (e.g., social security number, financial account numbers, phone number, e-mail address, or usernames and passwords for online financial accounts). However, if identity theft or a data breach compromises your personal financial information, here are some important steps to take immediately.

READ MORE

5 Smart Ways to Deter Identity Theft

You’ve heard the expression, “Locks were made to keep honest people honest.” The same may be said for identity theft protection.

You can do everything within your power to keep your information private, but hackers and criminals intent on stealing and using your identity are also intent on finding a way to make it happen. They’re crafty. They’re persistent.

That doesn’t mean you shouldn’t take steps to protect your personal information. It just means you also need to be persistent about protecting your information and become aware of the steps to take if your information is compromised. Such knowledge will allow you to act quickly, and possibly stem the damage.

READ MORE

Cyber attacks have already targeted critical infrastructure around the world and the U.S. could be next

As the modern world increasingly becomes “wired,” more critical systems and infrastructure are being linked via the Internet. And while that has given rise to incredible new technologies that boost efficiency and capability, it has also meant that countries are more vulnerable to hacking and cyber attack.

Most nations do their best to defend their critical networks against hackers, DDoS (denial of service) attacks and outright cyber assaults. But not all systems are well-protected; some, in fact, are incredibly vulnerable.

READ MORE

Verizon 2015 Data Breach Investigations Report Finds Cyberthreats Are Increasing in Sophistication

Verizon’s “2015 Data Breach Investigations Report,” reveals that cyberattacks are becoming increasingly sophisticated, but that many criminals still rely on decades-old techniques such as phishing and hacking. According to this year’s report, the bulk of the cyberattacks (70 percent) use a combination of these techniques and involve a secondary victim, adding complexity to a breach.

Another troubling area singled out in this year’s report is that many existing vulnerabilities remain open, primarily because security patches that have long been available were never implemented. In fact, many of the vulnerabilities are traced to 2007 — a gap of almost eight years.

As in prior reports, this year’s findings again pointed out what Verizon researchers call the “detection deficit” — the time that elapses between a breach occurring until it’s discovered. Sadly, in 60 percent of breaches, attackers are able to compromise an organization within minutes.

Yet the report points out that many cyberattacks could be prevented through a more vigilant approach to cybersecurity. “We continue to see sizable gaps in how organizations defend themselves,” said Mike Denning, vice president of global security for Verizon Enterprise Solutions

 

READ MORE

Nuclear power plants are ripe for hacking due to a ‘culture of denial,’ new study warns

Following the Fukushima nuclear disaster in March 2011, there were calls throughout the industry to tighten safety standards at all atomic power plants around the world. However, according to a new review of the industry, cyber security was apparently not high on the list.

As reported by the UK’s Financial Times, nuclear power plant managers are engaged in a “culture of denial” about the risks of cyber attack, as many have failed to take adequate measures to protect themselves from hacking, the review found.

READ MORE

Things Seniors Need to Know About Identity Theft (Pass it On)

The University of Tennessee Extension is promoting a new education campaign designed by the Federal Trade Commission to enlist people over 65 in the effort to recognize and report frauds and scams called Pass it On.

Pass It On reinforces what older people already know about some of today’s most common scams, and it gives them a short and straightforward way to share that knowledge with their family members, friends and communities. It focuses on their ability to be part of the solution instead of implying they’re part of the problem when it comes to scams.

Let’s discuss identity theft. Someone gets your personal information and runs up bills in your name. They might use your Social Security or Medicare number, your credit card, or your medical insurance – along with your good name.  How would you know?

READ MORE

Visualising the invisible: An invisible but vast war zone created by cyberattacks

Is this where we live?

Every month, it seems, a mammoth cyberattack sponsored by a nation state comes to light. In recent years, more than 20 countries have announced their intent to launch or beef up their offensive cyber capabilities. The result is a burgeoning digital arms race that presents a major threat to the security of our data.

But they are very late to the game…

READ MORE