Laptop Encryption Is The Most Commonsense Way To Protect Portable Computers.

InformationWeek has an in-depth article on preventing data loss, and has fingered encryption as a must-have in one’s arsenal.  They correctly point out that it’s the most “commonsense” way to protect data, and that it also helps avoid penalties in certain states if the computer were to be stolen.   How powerful is encryption?  It […] read more

Eleven Laptops Stolen Out Of Japanese Embassy. No Word On Laptop Security. One Conspiracy Nut Created: Me.

The Yomiuri Shimbun is reporting that eleven laptops were stolen from a Japanese Embassy in Brussels, Belgium.  Japanese expatriates—about 12,700 of them—might be affected.  The information on the laptops included residence certification, overseas voting registrations, and passport information.  The information on residence certification also include personal details such as date of birth, name, permanent address […] read more

UK Doctors To Be Prosecuted If Laptop Encryption Not Present In Stolen Devices?.

Richard Thomas, the Information Commissioner in the UK, has told the Lords’ Constitution Committee that doctors who have their laptops stolen due to carelessness should end up in court.  Of course, the matter is not as simple as it sounds.  Mr. Thomas’s words were as follows:   “If a doctor, or hospital [employee] leaves a […] read more

Sloppy Laptop Security Can Cost Over $500,000.

The value of the data on those who do carry valuable information on their laptops is $525,000 on average.  This was the result of a survey commissioned by a company that specializes in offering secured wireless and wired broadband services to hotels and conference centers.   The survey included 491 participants, all of them users […] read more

Laptop Security For University Students.

The Daily Bruin, a UCLA publication, is carrying an article about laptop thefts on their campus.  Eleven computer-related thefts were already reported in the month of October, despite the fact that this is not the beginning of the year anymore, and hence, one would assume, that students are not as trusting as they were at […] read more

Corporate Espionage And Data Security.

The Korea Times is reporting that two executives at STX Heavy Industries, based out of South Korea, were arrested this past Friday on charges of stealing key technology from their former employer, Doosan Heavy Industries & Construction.  The technology in question was related to desalination and power generation.  Doosan is one of the lesser known […] read more

Data Center In Chicago Is Broken Into (Twice!): Why Hard Disk Encryption Should Be Considered Even When You’ve Got Cages and Security Guards.

An article in mentions how a Chicago-based data hosting center, C I Host, was broken into twice.  The more recent case was about a month ago, on October 2nd, when armed robbers (!) broke into the facility by “cutting into the reinforced walls with a power saw.”  The night manager present was tasered and […] read more

EMS Laptop Missing: Approximately 30,000 Potentially Affected By Lack of True Endpoint Security.

A laptop used by emergency medical services (EMS) personnel went missing in North Carolina.  The device was left on the bumper of an ambulance.  While details are sketchy, it sounds like the computer was left by accident on the ambulance, and somebody swung by and lifted it.  Or, it could have been left on the […] read more

MSU To Delete All Sensitive Personal Data To Improve Laptop Security.

Montana State University (MSU) is informing students and faculty that they might have been victims of another data security breach; MSU had a security breach earlier this year.  On November 2, the universities announced that a stolen laptop contained Social Security numbers on two hundred students.  In a separate incident on the same day, they […] read more

A Sure-Fire Way of Preventing Endpoint Security Breaches In Phishing Scams. has recently issued an alert to their customers, letting them know that a employee was the victim of a phishing scam.  This allowed the phishers  to copy customer contact list which was subsequently used for sending e-mails that looked like invoices, but designed to collect passwords.  Perhaps this was an exploratory […] read more