Real World Risk Management Practical HR Resources
Are you a new user?


Upgrades And Updates: Why Smart Organizations Stay On Top Of Both

A software upgrade to Apple iPhones introduces a new feature that some police and cybersecurity experts say can result in users' contact information being shared with strangers.

The update for iPhones introduces a new feature called "NameDrop." This function allows users to share their contact information more easily. When two users hold their phones close together, they will receive a pop-up window notifying each that another would like to have their contact card, which can include email, phone number, birthdate, home address, and other information.

The user does have to accept the request before any information is shared, but experts warn that children in particular may not pay attention, and simply choose "accept" when a stranger is standing close and requesting their contact information.

The NameDrop feature is on by default, but users can turn it off in the Airdrop heading in General Settings, under the "Bringing Devices Together" tab. "Apple's iPhone iOS17 NameDrop feature 'major red flag' for cybersecurity, expert says" (Nov. 27, 2023).




It is a good idea for organizations to evaluate new features from hardware providers to determine if they present an organizational security risk. For example, here is a link to the Apple support page for its latest update, showing all the features.

Organization should also address the importance of keeping mobile device firmware and software updated because updates often contain important security features that address emerging threats.

Despite your best efforts, your personal or organizational devices may become compromised. Here are signs that could indicate personal identifiers may have been stolen:

·  Unauthorized charges appear on credit or bank accounts.

·  Being denied a line of credit for a poor credit rating, despite a history of good credit

·  Failing to receive credit card or bank statements in the mail as expected

·  Being contacted by creditors about money owed for items you or your employer did not purchase

·  Failing to receive new or renewed credit cards in the mail

·  Merchants refuse to honor checks.

·  Medical providers bill you for services you did not receive.

·  A health plan rejects a claim because you have reached your spending limit.

·  The IRS notifies you that more than one tax return or refund request was filed in your or your employer's name.

·      An organization you do business with, or have an account with, notifies you that a data breach compromised your, or your employer's, information.


Finally, your opinion is important to us. Please complete the opinion survey:

Cybercriminals: Now Targeting Apple Users

Apple devices are emerging as a new target for cybercriminals who are using proven social engineering tricks. What steps can users take to limit their risk?

read more

Ask Jack: Why Shouldn't I Use My Work Computer For Online Games?

Kids like to game on any device. Work devices are no exception. Jack explains why games should not be played on work devices.

read more

Cybercriminals Are Using Booking.Com Refund Ploy As Bait

Everyone likes a refund, cybercriminals know this, so they are using this tactic to spread malware. We examine ways to minimize your risk.

read more

Ask Jack: Is AI A Threat. . . Now?

For months, experts have predicted that artificial intelligence (AI) will change the cyber defense landscape. Jack details a report that states it is now here.

read more