Corporate Espionage And Data Security.

The Korea Times is reporting that two executives at STX Heavy Industries, based out of South Korea, were arrested this past Friday on charges of stealing key technology from their former employer, Doosan Heavy Industries & Construction.  The technology in question was related to desalination and power generation.  Doosan is one of the lesser known […] read more

Workplace Education As Important As Data Encryption When It Comes To Endpoint Security: A Calculation.

According to a national survey conducted by ISACA, thirty-five percent of US workers have violated their company’s IT policies.  Sixteen percent have also used peer-to-peer filesharing programs at work.  When put in this context, I guess, it’s not surprising that major companies such as Pfizer and Citigroup had a major data breaches in the past […] read more

There’s That Word Again: Hope, And The Data Security Blues.

  “Saving money and being PCI-compliant is important to us, but equally important is protecting ourselves against intruders. Even though we have some breathing room with PCI, we are still vulnerable with WEP as our security key. It must be a risk we are willing to take for the sake of saving money and hoping […] read more

Data Encryption And SMBs – The Smaller You Are, The Greater The On-Line Threat.

Many of the stories covered in the media regarding data and security breaches involves companies that are large, usually Fortune 500, maybe Fortune 1000.  We must not forget, however, that any business needs to practice proper security when it comes to customer data.  For example, the Boston Globe covers today the theft of customers’ credit […] read more

Alumni Data And University Administrative Functions: Data Encryption Is Vital, For Now.

There is news today that over seven thousand former students of the University of Cincinnati were affected in a data breach.  A flash drive with sensitive information on 7366 students and graduates was stolen from an employee’s desk. One of the people interviewed for the article, Cybil Pearson, stated that she had not been at […] read more

Full Disk Encryption By Itself Is Partial Protection, but AlertBoot Provides COMPLETE PROTECTION.

Almost on a daily basis we hear about large organizations losing laptops or computer media with confidential customer or employee data.  The companies are then forced to determine their risk and liability by confirming whether or not the data was encrypted. The legal position is that encrypted data translates to no data loss¸ and the […] read more

Non-Profits May Need Endpoint Security Even More than For-Profits.

It looks like there isn’t a lot of media coverage, but there’s a small article in the Arkansas Democrat Gazette a hacker gained illegal access to servers for the Nature Conservancy.  Personal information regarding 14,000 people may have been compromised, including employees and their families.  Payroll information, including direct deposit bank account numbers, was part […] read more

A Mobile Office Requires Endpoint Security.

According to the article at SecurityPark.net, a SonicWALL survey shows that more and more business leaders and managers are getting comfortable with the idea of remote working.  The reasons for this increasing positive attitude seem to be heavily geared towards employee motivation and the cost of doing business (the savings on office space! What a […] read more

Governator Wants to Plug Up Holes – Unless You Have Encryption.

It looks like businesses in California and, if history serves, in the rest of the United States might soon have an incentive to really start taking a look at their security policies (things seem to spread from California to the rest of the country).  A bill in California will force retailers to reimburse banks and […] read more

Application Control Is An Effective Method To Stem Malware For Endpoint Security.

There is news today that Germany’s Federal Crime Office has busted a gang of phishing scammers.   The gang has been under surveillance for about 18 months, and the arrests have been in several German cities.  The gang was actually composed of people from Germany, Russia, and the Ukraine.  Unlike the initial phishing techniques used […] read more