Bank Data Security: Trojans Being Spread Via Mail (Postal Mail, That Is).

It looks like some criminals are resorting to real-world exploits to further their virtual-world crimes.  It makes sense since the past couple of years or so has seen an unprecedented amount of interest in data security, like AlertBoot drive encryption software for laptops and storage devices, firewalls for on-line protection, etc. And, they’re getting much […] read more

What Is A Third Party Data Breach?.

What is a third party breach? Who’s responsible for third party data breaches? How can third party breaches be prevented? A third party data breach is exactly what the name implies: it’s when sensitive information is lost by a third party.  For example, let’s say you’re a customer of Company A.  This company contracts out […] read more

Software Application Control: Manage Program Installations.

Information security means more than installing encryption software.  Yes, encryption will protect the contents of your laptop or desktop computer if it gets stolen during a burglary.  But, that’s just one aspect of data security.  What about hackers, who get to your data via non-physical means? You’ll want to have your software patched and up-to-date […] read more

Preventing Employee Data Theft: Encryption As Well As Other Security Measures.

Preventing employees from stealing data has always been important.  After all, theft has always been a part of running a business.  However, never has there been a greater sense of urgency in protecting sensitive information.  Studies show that employee theft has increased significantly since the recession hit the US; some show over 80% of employees […] read more

File Data Encryption Software Being Used To Hold People To Ransom.

FileFix Pro 2009 ransomware How the scam works Nothing new under the sun, ransomware is not scareware Technology has legitimate use A new type of scareware is making the rounds.  In fact, it does more than scare: it essentially asks for ransom: either pay up $50, or kiss your data good-bye.  At the heart of […] read more

USB Port Control Software: It May Be A Better Solution Than SWIFT Codes.

Hacking a bank via computer USB ports How to control, not block, USB ports The internet was awash yesterday with the story of a fraud attempt that would have netted a motley crew hundreds of millions of dollars.  The use of USB port control software, a security feature that can be combined with drive encryption […] read more