The Daily Bruin, a UCLA publication, is carrying an article about laptop thefts on their campus. Eleven computer-related thefts were already reported in the month of October, despite the fact that this is not the beginning of the year anymore, and hence, one would assume, that students are not as trusting as they were at […] read more
Data Center In Chicago Is Broken Into (Twice!): Why Hard Disk Encryption Should Be Considered Even When You’ve Got Cages and Security Guards.
An article in theregister.co.uk mentions how a Chicago-based data hosting center, C I Host, was broken into twice. The more recent case was about a month ago, on October 2nd, when armed robbers (!) broke into the facility by “cutting into the reinforced walls with a power saw.” The night manager present was tasered and […] read more
A laptop used by emergency medical services (EMS) personnel went missing in North Carolina. The device was left on the bumper of an ambulance. While details are sketchy, it sounds like the computer was left by accident on the ambulance, and somebody swung by and lifted it. Or, it could have been left on the […] read more
Laptop Security, Theft, And Public Relations: Password Protection Is Not “Protection” If There Is No Device Encryption.
We seem to have a new trend: I’m seeing more and more instances of people stating after a data breach that the lost or stolen computer was not encrypted but was password?protected: The Home Depot and the Kiski Area School District instances are the two that come into mind as of right now, but there […] read more
Workplace Education As Important As Data Encryption When It Comes To Endpoint Security: A Calculation.
According to a national survey conducted by ISACA, thirty-five percent of US workers have violated their company’s IT policies. Sixteen percent have also used peer-to-peer filesharing programs at work. When put in this context, I guess, it’s not surprising that major companies such as Pfizer and Citigroup had a major data breaches in the past […] read more
Khaki Bandit: Extreme Social Engineering (or, An Extreme Reason For Greenlighting Laptop Encryption).
The Khaki Bandit. That’s how Eric Almly was known in Milwaukee when they didn’t have a name to match up with the burglaries. He’s been connected to computer thefts in Minnesota, California, Arizona, and Florida. Supposedly, Almly’s modus operandi was to walk into corporate offices and lift laptops found in the office. He wouldn’t walk […] read more
“Saving money and being PCI-compliant is important to us, but equally important is protecting ourselves against intruders. Even though we have some breathing room with PCI, we are still vulnerable with WEP as our security key. It must be a risk we are willing to take for the sake of saving money and hoping […] read more
TJX is back in the news, and in a big way. The reason for the brouhaha is the new estimated number of credit card accounts compromised when TJX security was breached last year. The new number is 94 million, double the original TJX estimates of 46 million, as reported in a court filing. The new […] read more
There were reports last week that a laptop containing personal information on over 160,000 people was stolen from Administaff, Inc., a Houston-based company. Administaff is a company that engages in outsourcing personnel management services, such as payroll administration. As such, it’s not surprising that Administaff deals with a lot of personal information, or that the […] read more
There is news today that over seven thousand former students of the University of Cincinnati were affected in a data breach. A flash drive with sensitive information on 7366 students and graduates was stolen from an employee’s desk. One of the people interviewed for the article, Cybil Pearson, stated that she had not been at […] read more