I’m reading in the Daily Mail that the personal data of 16,000 children was lost at a London hospital (Hmm… The headline says 16,000, the article says 160,000. That’s a huge difference). The data was contained on a computer disk. Thankfully, the information was encrypted before being sent: “BT couriered a fully encrypted disc containing […] read more
A datacenter in the Kings Cross area of London was the scene of a computer heist to the tune of $4M in hardware. It’s not mentioned whether that’s in US dollars or something else. Some are calling it an Ocean’s Eleven-like heist, but it sounds more like the Brink’s job in Boston. Incidentally, the latter […] read more
Forrester Research Not Following Their Own Recommendations When It Comes To Laptop Security. Ironic? Eh, Hardly..
In an episode that many are calling ironic, Forrester Research has sent out letters to affected employees that a laptop computer stolen from one of their employees contained private employee information—and, one would assume, that the device was not encrypted. Current as well as past employees are affected, and the data that could potentially fall […] read more
The lost CDs in the UK from last month are gifts that keep on giving. Giving headaches, that is; one could also get a case of permanent slackjaw as well. Because the lost CDs could affect nearly half the nation, Britons have been doing a lot of finger?pointing, nagging, and generally trying to pin the […] read more
SC Magazine has an article regarding the eight myths of data encryption, and I would like to comment on some of them. More specifically, I would like to comment on four of them, since only four of the eight were listed. (I’m not sure if the article was posted in haste, or whether it’s a […] read more
At least, that is the conclusion that the Ponemon Institute has arrived at, according to various articles on-line. Among the findings: Costs per breached record was $197 this year vs. $182 last year, an increase of 8% Breaches by third parties such as consultants and outsourced contractors accounted for 40% of the data security lapses, […] read more
Indian Military Research Facility Suffers Computer Theft – Electrified Fences Not Enough For Computer Security.
The Times of India and several other news sites are carrying articles about a break?in to the Defence Material Store Research Development and Establishment (DMSRDE) in India. As far as I can tell, this is a research laboratory under aegis of the Ministry of Defence (or Defense, if you prefer), a branch of an Indian […] read more
German Authorities Cannot Crack Skype Encryption. Should You Use The Same for Your Endpoint Security?.
As I was scanning the news in some Spanish sites, I came across an article at eleconomista.es where German police profess having problems with the encryption used by Skype, the Internet-based telephone company now owned by eBay. Based on the November 22nd article, the German police have been unable to decipher the encrypted calls. The […] read more
Ten Seconds Is All It Takes To Steal A Laptop. Make Laptop Encryption Part Of Your Endpoint Security Arsenal.
If one does a search for the words “laptop theft” in Google, the third result is the security footage of what looks to be a passing elderly man stealing a laptop. More specifically, this elderly man scouts the place out and steals the laptop that was displayed at a storefront window in broad daylight, with […] read more
Another Day, Another Data Breach At A Government Facility: US Department of Veteran Affairs Missing (Even More) Computers.
Hot on the trail of the UK Government’s misplacement of two CDs with sensitive information on nearly half of all Britannia, there’s a small story concerning the Veteran Affairs office in the US. Three PCs, two of them desktop machines and one of them a laptop, are missing from a medical facility in Indiana. The […] read more