I ran across a story that, as far as I know, is the first of its kind: proof that laptop thieves don’t just blast away the current information on a stolen laptop and sell it as quickly as possible. Oh, no. They’re willing to see what they can find on the laptop, which is why […] read more
If you are looking for an excuse that involves robots to sign up for MDM mobile security software like AlertBoot, look no further: researchers will be debuting a PIN-cracking robot at the 2013 DefCon in Las Vegas. The robot not only brute-forces your PIN, its schematics can be obtained for free and the necessary hardware […] read more
The government has argued that veterans who are suing the William Jennings Bryan Dorn VA Medical Center for a data breach did not formally experience any harm, and that the lawsuit ought to be dismissed. Honestly, I don’t know why the government is this position. Per my understanding, the VA was set to have laptop […] read more
Canada Data Encryption: Bureaucrats Ponder Burning Garbage, Hiring Dumpster Divers To Avoid Data Breach.
Ineptitude. This is the word that leapt to my mind as I read a story about Canadian bureaucrats who considered a couple of different ways to “avoid repercussions over” the loss of a USB memory stick. These kinds of incidents wouldn’t make the news if encryption software is used to protect and secure sensitive data. […] read more
Mobisante, a Redmond, Washington based company has released a tablet version of its popular ultrasound machine, previously only available on smartphones. Just like PCs in its 1990s heydays, mobile devices like smartphones and tablets are coming into their own. And just like PCs, it looks like it won’t be too long before mobile device protection […] read more
Sony has decided not to appeal the £250,000 monetary penalty that was assessed by the UK Information Commissioner’s Office (ICO). The penalty stands as the largest assessed to date under the ICO’s purview. This decision gives added impetus for companies in the United Kingdom to properly secure any personal information they have collected and resides […] read more
HIPAA encryption software: although HIPAA does not require the use of data encryption, the rules also make it impossible not to use it when dealing with electronic PHI. And, the Final Omnibus Rule was changed so that business associates and their subcontractors are liable for breaching ePHI if encryption is not used. And for a […] read more
I’ve come across a story that just invokes the type of terror you’re supposed to experience at a horror movie. According to syracuse.com, St. Joseph’s Hospital Health Center nearly removed organs from a woman who was alive. Scandalous, right? I did another double-take when I saw how much “St. Joe’s” got fined for the mishap: […] read more
The Ponemon Institute has released its eighth annual report on the state of data breaches. While many things have changed since the first report, others have remained the same. For example, the latest survey shows that human error still occupies a significant position when it comes to data breaches, with over 30% being attributed to […] read more
Education Encryption: Laptop Encryption Beats Locked Rooms, Shows University Of South Carolina Data Breach.
The use of laptop encryption in higher education, especially by faculty and staff, seems like a no-brainer to me. After all, such computers are full of personal information, not only of the devices’ owners themselves but also of the student body (they still use SSNs as student IDs, don’t they?). While the Department of Education […] read more