State of Connecticut Latest Victim of Ohio Tape Theft – Why Data Encyption Should Be a Key Weapon In Your Security Arsenal.

The state of Connecticut is back in the news due to another security breach.  You’ll remember that a state laptop was stolen earlier this month, and I remarked that laptop encryption by AlertBoot would have helped in this case.  The Connecticut government is not to blame in this particular instance, however.  The state is getting […] read more

Encryption is a Key Ingredient when Limes and Wires Mix.

Looks like another bank has been struck by a data breach.  The victim in this case is Citigroup, more specifically the ABN Amro Mortgage Group unit.  An employee at the mortgage unit inadvertently leaked the Social Security numbers and credit information (not “credit card” information) of 5208 customers.  How did the data breach happen?  The […] read more

Data Breach Insurance Might Dampen The Need For Data Security? I Say Otherwise.

I’ve recently been reading up on some opinion pieces regarding insurance for security data breaches.  There seems to be some controversy regarding such insurance.  A subsidiary of AIG insurance, for example, has been offering a policy called netAdvantage for some time now.   Apparently, people have been signing up left and right in light of the […] read more

A Mobile Office Requires Endpoint Security.

According to the article at SecurityPark.net, a SonicWALL survey shows that more and more business leaders and managers are getting comfortable with the idea of remote working.  The reasons for this increasing positive attitude seem to be heavily geared towards employee motivation and the cost of doing business (the savings on office space! What a […] read more

Governator Wants to Plug Up Holes – Unless You Have Encryption.

It looks like businesses in California and, if history serves, in the rest of the United States might soon have an incentive to really start taking a look at their security policies (things seem to spread from California to the rest of the country).  A bill in California will force retailers to reimburse banks and […] read more

Application Control – Whitelists for Controlling Malware.

There is news that security vendors are beginning to rethink their philosophy on how to protect computers.  The current practice is for security vendors to create blacklists of software that is not allowed to run on a computer.  This protects computer users from the installation of malicious software.  The problem with such a strategy is […] read more

Who Protects Those Who Police Us? Law Enforcement Needs File Encryption In More Ways Than Expected.

The need for data protection might be highest for those who protect us.  I recently read an article concerning an accident that happened in York, England.  A spreadsheet containing the personal information of police constables and deputy constables was posted to the York county’s website.  Among the information listed were Social Security numbers and home […] read more

A Different Take On The Consequence Of Ineffective Data Security – Employees Sue, Too.

Some of you might remember a case from almost 2 years ago where unencrypted computer disks and tapes containing the information of patients, close to 350,000 of them, was stolen from the backseat of a car.  Well, it looks like the saga continues.  The IT worker who blew the whistle on this particular data breach […] read more

Application Control Is An Effective Method To Stem Malware For Endpoint Security.

There is news today that Germany’s Federal Crime Office has busted a gang of phishing scammers.   The gang has been under surveillance for about 18 months, and the arrests have been in several German cities.  The gang was actually composed of people from Germany, Russia, and the Ukraine.  Unlike the initial phishing techniques used […] read more

The Dark Continent Suffers from Cyberattacks, Just Like Any Other Country. Why They Need Data Encrytion.

Here’s a new twist on an old problem.  Many of us associate phishing scams coming from some part of Africa.  This is in no small part due to all the spam e-mails that, if we were to allow them to introduce themselves, we certainly would end up assisting them financially, for we might end up […] read more