Laptop Encryption: Thieves Stick Up Doc, Ask For Passwords To Encrypted Computer.

Brigham and Women’s Hospital (BWH) has notified nearly 1,000 people that a computer that was protected with laptop encryption software has been stolen.  Normally, the use of encryption would provide safe harbor from sending such a notification letter, not only under HIPAA (the federal set of laws that govern medical organizations) but also under Massachusetts’s […] read more

Data Security: Home Depot’s Execs Switch To Macs, iPhones After Data Breach.

The Wall Street Journal reports on the Home Depot data breach.  Among some of the revelations is that (a) they had actually upgraded to the latest security measures when the data breach was discovered and (b) executives were handed Apple devices to counteract the immediate damage.  Seeing how these were “secure,” it sounds like disk […] read more

The 5th Amendment: Fingerprints Not Protected Like Passwords Are.

When it comes to smartphone encryption, it seems that Apple’s fingerprint-based TouchID unlocking feature is not so great (although most people seem to readily agree that the same, when it comes to mobile payments, is nothing short of miraculous).  A Circuit Court judge has ruled that a defendant can be compelled to give up his […] read more

Data Security: US Supreme Court Says Warrants Needed For Cellphone Search.

According to the US Supreme Court, US authorities require warrants in order to search the cellphones of people who are arrested [http://www.supremecourt.gov/opinions/13pdf/13-132_8l9c.pdf ; ].  The decision is not solely for cellphones, though: rummaging through information found on smartphones, tablet computers, laptops, etc. should also be affected, with personal privacy being the winner. Also, I imagine […] read more

HIPAA Encryption Report: HHS/OCR Releases 2011/2012 Annual Report on PHI Breaches.

The US Department of Health and Human Services, Office for Civil Rights has released their annual report on data breaches involving protected health information.  The report covers the dates of January 1, 2011 through December 31, 2012, according to phiprivacy.net.  While it may reflect the near past, it shows why HIPAA encryption is so important: […] read more

Apple iPhone Security: Devices In Australia Hijacked By Ransom Ware.

Let’s say you are the owner of one of the i-products: iPhone, iPad, or iPod (touch).  There are  Apple MDM products designed to secure these devices.  Likewise, Macintoshes can be secured using Apple’s File Vault 2, a disk encryption software that comes free with every Mac sold in the last two years. You’re feeling secure, […] read more