Ensure There Is No Gap When It Comes To Laptop Encryption.

The Gap, the San Francisco-based clothes retailer, has just issued a press release that a laptop containing the information of 800,000 job applicants has been stolen.  In all fairness, this is not the fault of The Gap, but one of the vendors that they hired to manage the job applicant data.  Just when I thought […] read more

Here’s Why All Data Should Be Encrypted – Regardless Of What The Official Policies Are.

I’ve been revisiting some security breach cases from earlier this year, and one of the more confounding ones is the data breach that happened at the VA in Birmingham, Alabama.  A hard drive, with some of the files encrypted but most of them not, was stolen from the premises.  The VA Office Inspector General released […] read more

State of Connecticut Latest Victim of Ohio Tape Theft – Why Data Encyption Should Be a Key Weapon In Your Security Arsenal.

The state of Connecticut is back in the news due to another security breach.  You’ll remember that a state laptop was stolen earlier this month, and I remarked that laptop encryption by AlertBoot would have helped in this case.  The Connecticut government is not to blame in this particular instance, however.  The state is getting […] read more

Encryption is a Key Ingredient when Limes and Wires Mix.

Looks like another bank has been struck by a data breach.  The victim in this case is Citigroup, more specifically the ABN Amro Mortgage Group unit.  An employee at the mortgage unit inadvertently leaked the Social Security numbers and credit information (not “credit card” information) of 5208 customers.  How did the data breach happen?  The […] read more

Data Breach Insurance Might Dampen The Need For Data Security? I Say Otherwise.

I’ve recently been reading up on some opinion pieces regarding insurance for security data breaches.  There seems to be some controversy regarding such insurance.  A subsidiary of AIG insurance, for example, has been offering a policy called netAdvantage for some time now.   Apparently, people have been signing up left and right in light of the […] read more

A Mobile Office Requires Endpoint Security.

According to the article at SecurityPark.net, a SonicWALL survey shows that more and more business leaders and managers are getting comfortable with the idea of remote working.  The reasons for this increasing positive attitude seem to be heavily geared towards employee motivation and the cost of doing business (the savings on office space! What a […] read more

Governator Wants to Plug Up Holes – Unless You Have Encryption.

It looks like businesses in California and, if history serves, in the rest of the United States might soon have an incentive to really start taking a look at their security policies (things seem to spread from California to the rest of the country).  A bill in California will force retailers to reimburse banks and […] read more

Application Control – Whitelists for Controlling Malware.

There is news that security vendors are beginning to rethink their philosophy on how to protect computers.  The current practice is for security vendors to create blacklists of software that is not allowed to run on a computer.  This protects computer users from the installation of malicious software.  The problem with such a strategy is […] read more

Who Protects Those Who Police Us? Law Enforcement Needs File Encryption In More Ways Than Expected.

The need for data protection might be highest for those who protect us.  I recently read an article concerning an accident that happened in York, England.  A spreadsheet containing the personal information of police constables and deputy constables was posted to the York county’s website.  Among the information listed were Social Security numbers and home […] read more

A Different Take On The Consequence Of Ineffective Data Security – Employees Sue, Too.

Some of you might remember a case from almost 2 years ago where unencrypted computer disks and tapes containing the information of patients, close to 350,000 of them, was stolen from the backseat of a car.  Well, it looks like the saga continues.  The IT worker who blew the whistle on this particular data breach […] read more