Corporate Espionage And Data Security.

The Korea Times is reporting that two executives at STX Heavy Industries, based out of South Korea, were arrested this past Friday on charges of stealing key technology from their former employer, Doosan Heavy Industries & Construction.  The technology in question was related to desalination and power generation.  Doosan is one of the lesser known […] read more

Data Center In Chicago Is Broken Into (Twice!): Why Hard Disk Encryption Should Be Considered Even When You’ve Got Cages and Security Guards.

An article in theregister.co.uk mentions how a Chicago-based data hosting center, C I Host, was broken into twice.  The more recent case was about a month ago, on October 2nd, when armed robbers (!) broke into the facility by “cutting into the reinforced walls with a power saw.”  The night manager present was tasered and […] read more

A Sure-Fire Way of Preventing Endpoint Security Breaches In Phishing Scams.

Salesforce.com has recently issued an alert to their customers, letting them know that a Salesforce.com employee was the victim of a phishing scam.  This allowed the phishers  to copy Salesforce.com customer contact list which was subsequently used for sending e-mails that looked like Salesforce.com invoices, but designed to collect passwords.  Perhaps this was an exploratory […] read more

Data Protection: Need, Right, And Time Should Be Extended To Mobile Devices Such As Laptops For Better Security.

In a Government Technology article, an argument is made that access to data should be granted on a need, right, and time basis.  Now, this is not a new argument, and it was directed to securing databases and their contents.   The argument is that not everyone needs to have access to information on a […] read more

University Sends Internal Student List To Student – Why Data Encryption Will Always Be Needed.

Eight thousand students and applicants to Duquesne University narrowly avoided becoming victims to a data breach.  Or, rather, they avoided becoming victims to personal information peddlers.  A file containing mostly students’ financial information was sent by mistake to a Duquesne student, who promptly reported the incident to university officials.  The information included Social Security numbers […] read more

Real Data Security Is Necessary In Virtual Environments As Well.

The Infotech section of the India Times on-line recently carried an article where an insider leaked software code to a rival team.  I’m not sure if actually happened, or if it’s just a what-if scenario, but it is readily believable.  In fact, I’ll bet it’s not unusual, although I doubt it’s common.  Essentially, the insider […] read more

Written Rules Are Worthless When It Comes To Ensuring Data Security.

While scanning the latest data security breach stories, I have noticed that a lot of them involve institutions of higher learning.  Most of them involve theft of digital devices, mostly laptops.  It’s only now that I’ve realized that a new school year has started just recently.  Most of these cases are trivial, if you will.  […] read more

Data Security Is Even More Necessary Where HIPAA And Celebrities Meet.

Celebrities—be they rock stars or presidential candidates or that crazy guy in the corner screaming about the end of the earth—are ultimately people.  They will get sick, and that means that they will have to go to a hospital at some point.  Now, because there is a lot of sensitive and confidential patient data used […] read more

Do You Wipe Your Data Before Throwing Your Computer Out? Why Not Employ Hard Drive Encryption?.

Over the past couple of months I have read short pieces here and there on researchers buying used hard drives from secondhand sources and testing to see whether previous data can be extracted using sophisticated software and other data recovery methods.  The hard drives come from a variety of sources.  Usually they are bought in […] read more

Non-Profits May Need Endpoint Security Even More than For-Profits.

It looks like there isn’t a lot of media coverage, but there’s a small article in the Arkansas Democrat Gazette a hacker gained illegal access to servers for the Nature Conservancy.  Personal information regarding 14,000 people may have been compromised, including employees and their families.  Payroll information, including direct deposit bank account numbers, was part […] read more