Khaki Bandit: Extreme Social Engineering (or, An Extreme Reason For Greenlighting Laptop Encryption).

The Khaki Bandit.  That’s how Eric Almly was known in Milwaukee when they didn’t have a name to match up with the burglaries.  He’s been connected to computer thefts in Minnesota, California, Arizona, and Florida.  Supposedly, Almly’s modus operandi was to walk into corporate offices and lift laptops found in the office.  He wouldn’t walk […] read more

There’s That Word Again: Hope, And The Data Security Blues.

  “Saving money and being PCI-compliant is important to us, but equally important is protecting ourselves against intruders. Even though we have some breathing room with PCI, we are still vulnerable with WEP as our security key. It must be a risk we are willing to take for the sake of saving money and hoping […] read more

The Heart Wants, And The Mind Says Yes To Mobile Encryption…But The Body Doesn’t Follow?.

There were reports last week that a laptop containing personal information on over 160,000 people was stolen from Administaff, Inc., a Houston-based company.  Administaff is a company that engages in outsourcing personnel management services, such as payroll administration.  As such, it’s not surprising that Administaff deals with a lot of personal information, or that the […] read more

Data Protection: Need, Right, And Time Should Be Extended To Mobile Devices Such As Laptops For Better Security.

In a Government Technology article, an argument is made that access to data should be granted on a need, right, and time basis.  Now, this is not a new argument, and it was directed to securing databases and their contents.   The argument is that not everyone needs to have access to information on a […] read more

Laptop Security As Part of Freshman Orientation?.

A new school year has started in the United States, and already there seems to be a deluge of laptop theft stories in the media.  A small number of them are covered in the national media, such as the laptop theft in Arizona that affected students in Iowa:  a former teaching assistant in Iowa had […] read more

Is Disk Encryption Effective When A Trusted Employee Is Involved In The Crime?.

I’ve read today an article where Joseph Harris, a former manager of the San Jose Medical Group, was sentenced to 21 months in prison.  He also has to pay $145,154 in restitution and will be under supervision for three years after his release.  His crime?  Stealing computer equipment from the branch he was working at […] read more