Application Control Software: A Reminder Of Its Importance, Curious George, And The Lovesick.

Lovesick malware-spreader hits hospital Curious George is a bad monkey.  He’s spreading malware Hard disk encryption  is one of the best methods for protecting your data.  However, it’s not the “be all, end all” of computer data security.  And here are a couple of notable cases that show you why. Ohio Hospital A Casualty A […] read more

Bank Data Security: Trojans Being Spread Via Mail (Postal Mail, That Is).

It looks like some criminals are resorting to real-world exploits to further their virtual-world crimes.  It makes sense since the past couple of years or so has seen an unprecedented amount of interest in data security, like AlertBoot drive encryption software for laptops and storage devices, firewalls for on-line protection, etc. And, they’re getting much […] read more

What Is A Third Party Data Breach?.

What is a third party breach? Who’s responsible for third party data breaches? How can third party breaches be prevented? A third party data breach is exactly what the name implies: it’s when sensitive information is lost by a third party.  For example, let’s say you’re a customer of Company A.  This company contracts out […] read more

Software Application Control: Manage Program Installations.

Information security means more than installing encryption software.  Yes, encryption will protect the contents of your laptop or desktop computer if it gets stolen during a burglary.  But, that’s just one aspect of data security.  What about hackers, who get to your data via non-physical means? You’ll want to have your software patched and up-to-date […] read more

Stop Data Theft: Choice Of Superglue Or Port Blocking Software?.

I still chuckle at reports of companies supergluing computer ports shut.  Now, when I say ports, I don’t mean internet ports, but your computer’s physical ports.  You know, the holes where you stick in your USB memory sticks, mice, and printers?  There are better methods to prevent data leakages than accidentally attaching your finger to […] read more

Military USB Memory Stick Ban: Lack Of Disk Encryption Is Not The Only Issue.

The US Department of Defense is banning USB memory stick as well as all other forms of removable media storage devices. (Makes me wonder why they didn’t react this quickly when they decided data encryption software was necessary to safeguard the information on their computers.)  In the face of this ban, it seems like a […] read more

Colombian Crisscrosses US To Steal Information From Hotel Computers With No Data Security.

A Colombian man, Mario Alberto Simbaqueba Bonilla, has been arrested in Miami for stealing information from computers in hotel business centers.  He stole credit card numbers and other personal information to the tune of more than $400,000, and now faces 10 years in prison.  The scam was perpetrated in the following manner: between 2004 and 2007, […] read more

Could Application Control And White Lists Be A Rising Star For Data Security?.

A couple of months back, antivirus companies such as Symantec proposed the use of white lists and black lists to control the ever-growing problem of malware infestation.  There was something for ruckus at the time because this particular solution has many problems.  Controlling which applications can and cannot run via the use of authorization lists […] read more