Burglarized Church: Computer Theft Targeted Hard Drives Only.

There is news that a church in the state of Georgia fell victim to burglary.  The thieves, however, seem to have been after a particular item: data.  The effort was well coordinated, according to an article at thecitizen.com.  The thieves entered the church from the darkest point outside the church.  A window was left unlocked […] read more

Medical Data Breach In British Columbia And New Brunswick.

Data tapes containing medicare billing information on 385 N.B. residents and 133 B.C. residents have gone missing.  An investigation is under way, although at this stage they believe the tapes are misplaced, not stolen (or lost, seems to be the implication).  The (much more believable) good news is that the tapes require specialized hardware and […] read more

Why Laptop Encryption Beats File Encryption When It Comes To Data Security.

Of course, it doesn’t mean that you can’t use both (or that using both is not recommended).  But encrypting an entire laptop’s hard drive holds an ace over individual file encryption: convenient, one-stop security.   Once a computer’s entire disk is encrypted, the only thing the end user has to do is remember the username […] read more

Tomorrow Is Computer Security Day. Change Your Passwords To Enhance Your Laptop Protection.

Computer Security Day falls on November 30th of each year, namely, tomorrow.  There are many things you can do to ensure that your laptop and desktop computers remain safe, ranging from running antivirus software and changing passwords to making sure liquids are not near your computer or electrical outlets.  Of course, some of them enhance […] read more

In The Digital Age, The Sun Never Sets On The (Former) British Empire: Canada Has Laptop Security Woes, Following UK And India.

Or at least, it certainly feels like it.  In addition to last week’s UK government public relations fiasco with the two lost CDs—and the other post I had regarding a break-in into an Indian government military research lab, where three computers got stolen—there are reports from Canada that a consultant for the Provincial Public Health […] read more

Indian Military Research Facility Suffers Computer Theft – Electrified Fences Not Enough For Computer Security.

The Times of India and several other news sites are carrying articles about a break?in to the Defence Material Store Research Development and Establishment (DMSRDE) in India.  As far as I can tell, this is a research laboratory under aegis of the Ministry of Defence (or Defense, if you prefer), a branch of an Indian […] read more

UK Up In Arms Over Loss Of Two CDs. 25 Million Britons Affected By Lack of Data Encryption.

HM Revenue & Customs (HMRC) has lost two CDs containing the details of 25 million people in the United Kingdom.  With the official population of the UK at 60.5 million, this represents slightly less than half of all the people in that country.  The matter was grave enough, combined with other data breaches at the […] read more

Laptop Encryption Is The Most Commonsense Way To Protect Portable Computers.

InformationWeek has an in-depth article on preventing data loss, and has fingered encryption as a must-have in one’s arsenal.  They correctly point out that it’s the most “commonsense” way to protect data, and that it also helps avoid penalties in certain states if the computer were to be stolen.   How powerful is encryption?  It […] read more

Laptop Security For University Students.

The Daily Bruin, a UCLA publication, is carrying an article about laptop thefts on their campus.  Eleven computer-related thefts were already reported in the month of October, despite the fact that this is not the beginning of the year anymore, and hence, one would assume, that students are not as trusting as they were at […] read more

A Sure-Fire Way of Preventing Endpoint Security Breaches In Phishing Scams.

Salesforce.com has recently issued an alert to their customers, letting them know that a Salesforce.com employee was the victim of a phishing scam.  This allowed the phishers  to copy Salesforce.com customer contact list which was subsequently used for sending e-mails that looked like Salesforce.com invoices, but designed to collect passwords.  Perhaps this was an exploratory […] read more