UK Government’s CD Loss Pales In Comparison To Laptop Security.

The lost CDs in the UK from last month are gifts that keep on giving.  Giving headaches, that is; one could also get a case of permanent slackjaw as well.  Because the lost CDs could affect nearly half the nation, Britons have been doing a lot of finger?pointing, nagging, and generally trying to pin the […] read more

The Eight Myths Of Data Encryption: Laptop Security Is More Attainable Than You Think.

SC Magazine has an article regarding the eight myths of data encryption, and I would like to comment on some of them.  More specifically, I would like to comment on four of them, since only four of the eight were listed.  (I’m not sure if the article was posted in haste, or whether it’s a […] read more

Data Breaches Incur Higher Costs And Customer Churn With Time.

At least, that is the conclusion that the Ponemon Institute has arrived at, according to various articles on-line.  Among the findings:  Costs per breached record was $197 this year vs. $182 last year, an increase of 8% Breaches by third parties such as consultants and outsourced contractors accounted for 40% of the data security lapses, […] read more

Indian Military Research Facility Suffers Computer Theft – Electrified Fences Not Enough For Computer Security.

The Times of India and several other news sites are carrying articles about a break?in to the Defence Material Store Research Development and Establishment (DMSRDE) in India.  As far as I can tell, this is a research laboratory under aegis of the Ministry of Defence (or Defense, if you prefer), a branch of an Indian […] read more

German Authorities Cannot Crack Skype Encryption. Should You Use The Same for Your Endpoint Security?.

As I was scanning the news in some Spanish sites, I came across an article at where German police profess having problems with the encryption used by Skype, the Internet-based telephone company now owned by eBay.  Based on the November 22nd article, the German police have been unable to decipher the encrypted calls.  The […] read more

Ten Seconds Is All It Takes To Steal A Laptop. Make Laptop Encryption Part Of Your Endpoint Security Arsenal.

If one does a search for the words “laptop theft” in Google, the third result is the security footage of what looks to be a passing elderly man stealing a laptop.  More specifically, this elderly man scouts the place out and steals the laptop that was displayed at a storefront window in broad daylight, with […] read more

Another Day, Another Data Breach At A Government Facility: US Department of Veteran Affairs Missing (Even More) Computers.

Hot on the trail of the UK Government’s misplacement of two CDs with sensitive information on nearly half of all Britannia, there’s a small story concerning the Veteran Affairs office in the US.  Three PCs, two of them desktop machines and one of them a laptop, are missing from a medical facility in Indiana.  The […] read more

Laptop Encryption Is The Most Commonsense Way To Protect Portable Computers.

InformationWeek has an in-depth article on preventing data loss, and has fingered encryption as a must-have in one’s arsenal.  They correctly point out that it’s the most “commonsense” way to protect data, and that it also helps avoid penalties in certain states if the computer were to be stolen.   How powerful is encryption?  It […] read more

Eleven Laptops Stolen Out Of Japanese Embassy. No Word On Laptop Security. One Conspiracy Nut Created: Me.

The Yomiuri Shimbun is reporting that eleven laptops were stolen from a Japanese Embassy in Brussels, Belgium.  Japanese expatriates—about 12,700 of them—might be affected.  The information on the laptops included residence certification, overseas voting registrations, and passport information.  The information on residence certification also include personal details such as date of birth, name, permanent address […] read more

Sloppy Laptop Security Can Cost Over $500,000.

The value of the data on those who do carry valuable information on their laptops is $525,000 on average.  This was the result of a survey commissioned by a company that specializes in offering secured wireless and wired broadband services to hotels and conference centers.   The survey included 491 participants, all of them users […] read more