A Sure-Fire Way of Preventing Endpoint Security Breaches In Phishing Scams.

Salesforce.com has recently issued an alert to their customers, letting them know that a Salesforce.com employee was the victim of a phishing scam.  This allowed the phishers  to copy Salesforce.com customer contact list which was subsequently used for sending e-mails that looked like Salesforce.com invoices, but designed to collect passwords.  Perhaps this was an exploratory […] read more

Data Protection: Need, Right, And Time Should Be Extended To Mobile Devices Such As Laptops For Better Security.

In a Government Technology article, an argument is made that access to data should be granted on a need, right, and time basis.  Now, this is not a new argument, and it was directed to securing databases and their contents.   The argument is that not everyone needs to have access to information on a […] read more

University Sends Internal Student List To Student – Why Data Encryption Will Always Be Needed.

Eight thousand students and applicants to Duquesne University narrowly avoided becoming victims to a data breach.  Or, rather, they avoided becoming victims to personal information peddlers.  A file containing mostly students’ financial information was sent by mistake to a Duquesne student, who promptly reported the incident to university officials.  The information included Social Security numbers […] read more

Real Data Security Is Necessary In Virtual Environments As Well.

The Infotech section of the India Times on-line recently carried an article where an insider leaked software code to a rival team.  I’m not sure if actually happened, or if it’s just a what-if scenario, but it is readily believable.  In fact, I’ll bet it’s not unusual, although I doubt it’s common.  Essentially, the insider […] read more

Written Rules Are Worthless When It Comes To Ensuring Data Security.

While scanning the latest data security breach stories, I have noticed that a lot of them involve institutions of higher learning.  Most of them involve theft of digital devices, mostly laptops.  It’s only now that I’ve realized that a new school year has started just recently.  Most of these cases are trivial, if you will.  […] read more

Data Security Is Even More Necessary Where HIPAA And Celebrities Meet.

Celebrities—be they rock stars or presidential candidates or that crazy guy in the corner screaming about the end of the earth—are ultimately people.  They will get sick, and that means that they will have to go to a hospital at some point.  Now, because there is a lot of sensitive and confidential patient data used […] read more

Do You Wipe Your Data Before Throwing Your Computer Out? Why Not Employ Hard Drive Encryption?.

Over the past couple of months I have read short pieces here and there on researchers buying used hard drives from secondhand sources and testing to see whether previous data can be extracted using sophisticated software and other data recovery methods.  The hard drives come from a variety of sources.  Usually they are bought in […] read more

Non-Profits May Need Endpoint Security Even More than For-Profits.

It looks like there isn’t a lot of media coverage, but there’s a small article in the Arkansas Democrat Gazette a hacker gained illegal access to servers for the Nature Conservancy.  Personal information regarding 14,000 people may have been compromised, including employees and their families.  Payroll information, including direct deposit bank account numbers, was part […] read more

Data Breach Insurance Might Dampen The Need For Data Security? I Say Otherwise.

I’ve recently been reading up on some opinion pieces regarding insurance for security data breaches.  There seems to be some controversy regarding such insurance.  A subsidiary of AIG insurance, for example, has been offering a policy called netAdvantage for some time now.   Apparently, people have been signing up left and right in light of the […] read more

The Dark Continent Suffers from Cyberattacks, Just Like Any Other Country. Why They Need Data Encrytion.

Here’s a new twist on an old problem.  Many of us associate phishing scams coming from some part of Africa.  This is in no small part due to all the spam e-mails that, if we were to allow them to introduce themselves, we certainly would end up assisting them financially, for we might end up […] read more