Is Disk Encryption Effective When A Trusted Employee Is Involved In The Crime?.

I’ve read today an article where Joseph Harris, a former manager of the San Jose Medical Group, was sentenced to 21 months in prison.  He also has to pay $145,154 in restitution and will be under supervision for three years after his release.  His crime?  Stealing computer equipment from the branch he was working at […] read more

Written Rules Are Worthless When It Comes To Ensuring Data Security.

While scanning the latest data security breach stories, I have noticed that a lot of them involve institutions of higher learning.  Most of them involve theft of digital devices, mostly laptops.  It’s only now that I’ve realized that a new school year has started just recently.  Most of these cases are trivial, if you will.  […] read more

Full Disk Encryption For the Really (Really) Bad Times?.

I have been following a story for the past couple of days regarding the political events in Burma (Myanmar, if you prefer).  More specifically, I’m following, or have attempted to follow an article that showed up in the Times where it was claimed that Burmese police and diplomats showed up at United Nations offices in […] read more

Data Security Is Even More Necessary Where HIPAA And Celebrities Meet.

Celebrities—be they rock stars or presidential candidates or that crazy guy in the corner screaming about the end of the earth—are ultimately people.  They will get sick, and that means that they will have to go to a hospital at some point.  Now, because there is a lot of sensitive and confidential patient data used […] read more

Pharmaceutical Company Back In The News Because Of Computer Security.

Pfizer is back in the news due to another security breach.  It’s the fourth time in four months.  I can almost imagine employees starting a pool to see if there’s a fifth event next month.  However, like the Gap incident a couple weeks ago, this particular incident is not due to Pfizer’s fault.  An outside […] read more

Connecticut State Employee Who Lost Laptop Is (Possibly) Identified: Mobile Data Security Revisited.

The Connecticut state employee who lost a laptop on the trip to Long Island, New York has been identified indirectly via police records.  The employee (I will not be in naming him here since the state will not confirm the identity; if you’re really desperate to have a name, Google it.), was a veteran worker […] read more

Do You Wipe Your Data Before Throwing Your Computer Out? Why Not Employ Hard Drive Encryption?.

Over the past couple of months I have read short pieces here and there on researchers buying used hard drives from secondhand sources and testing to see whether previous data can be extracted using sophisticated software and other data recovery methods.  The hard drives come from a variety of sources.  Usually they are bought in […] read more

Even the Film Industry Needs Encryption.

Francis Ford Coppola, the acclaimed director of numerous movies, but most well-known for The Godfather trilogy, has issued over the weekend a press release asking for the return of a backup device to his computer files.  Burglars entered his production office and home in Argentina (Coppola was slated to begin shooting a new movie in […] read more

Application Control Is An Effective Method To Stem Malware For Endpoint Security.

There is news today that Germany’s Federal Crime Office has busted a gang of phishing scammers.   The gang has been under surveillance for about 18 months, and the arrests have been in several German cities.  The gang was actually composed of people from Germany, Russia, and the Ukraine.  Unlike the initial phishing techniques used […] read more

Third Data Breach At Pharmaceutical Company Shows The Importance of Endpoint Security – An Update.

Well, it looks like some of the things I said might happen, due to the Pfizer security breach, materialized in short order.  According to this article in theday.com, a Connecticut publication, there has been a lot of activity at Pfizer World, Pfizer’s secure intranet.  Based on this article, the security breach was discovered in July […] read more