Posts Tagged ‘insider threat’

Business Info Fact Of The Day: Insiders Are Huge Information Security Threat

Wednesday, January 7th, 2009

According to a new Cisco study:

(more…)

Business Info Fact Of The Day: Insiders Are Huge Information Security Threat

Wednesday, January 7th, 2009

According to a new Cisco study:

(more…)

Insider Threat Example: 19,000 Pieces Of Computer Equipment Stolen; Why Didn’t Someone Notice?

Monday, December 29th, 2008

Okay, this story begs the question, why didn’t someone at the Naval Research Laboratory notice disappearing equipment…?

(more…)

Insider Threats Even More Significant During Down Economy

Tuesday, December 9th, 2008

I’ve written a lot about the insider threat, and the many different motivations for insiders to do malicious things (in addition to the other two types of insider threats of mistakes and lack of awareness).
Here are a couple of recently published research reports that shows how this horrible economy is impacting information security and making organizations even more vulnerable to privacy breaches…

(more…)

Email “Hack” Tells University Students & Staff That U.S. President Vote Is “Tomorrow”

Wednesday, November 5th, 2008

Here’s another email incident example to add to your files…

(more…)

The Insider Threat For Identity Theft: Watchout For Dead-Beat Parents

Tuesday, October 28th, 2008

Here’s a story that points to how vulnerable people are to identity theft and other types of crimes and frauds from slimy family…and ex-family…members…

(more…)

Insider Threat Example: Obama’s Campaign Folks Make Email Mistake

Wednesday, October 15th, 2008

No matter how much technology you throw at trying to prevent security incidents, the weakest link in the organization, your personnel (who could be your strongest link with effective training and ongoing awareness) can defeat that security technology.
On purpose, because of lack of knowledge, or by making a plain ol’ mistake.
And EVERYONE makes mistakes. Fewer if they are more diligently aware though.

(more…)

The Power of Logs: IRS Examiner Sentenced & Fined For Accessing PII Without Authorization

Monday, September 1st, 2008

Now, here’s a great example of an organization actually following through on their procedures to review access logs, and then to apply sanctions and take necessary other actions in response to non-compliance with not only organizational policies, but also with applicable laws…

(more…)

Laptop Containing PII of 1 Million+ People Sold On eBay for $141

Saturday, August 30th, 2008

I’ve been doing a lot of work with data retention and disposal policies and procedures lately, remembering the silly things I have read about with regard to organizations getting rid of their computers, such as selling their computers on eBay when they no longer need them…without removing the information! This is certainly not a phenomenon that is confined to the U.S.
Lo and behold, another situation has happened where an organization sold their old computer on eBay…for a bargain at £77 ($141), and it contained a a huge amount of personally identifiable information (PII), including credit card applications, on what is reported to be as many as over 1 million customers. Here are a few excerpts from the report in Forbes…

(more…)

Insider Threat Examples & 7th HIPAA Criminal Conviction

Monday, August 25th, 2008

Yesterday I read about the 7th criminal conviction and sentencing that has been given under HIPAA, “Woman gets 14 months in ID theft case.”

(more…)