Posts Tagged ‘mobile computing’

High Tech and Low Tech Continue to Bedevil Info Sec and Privacy Practitioners

Sunday, January 8th, 2012

When looking ahead to what may happen in this new year it is necessary to first look back.  Not only to 2011, but when making plans to move forward even further back to help make the best decisions moving forward.   I do a lot of reading, including many mainstream publications written for the general public.  You can see a lot of trends and problems by reading about how the general public is reporting (or not) about them.   I also like to read the various publications specific to information security, privacy, compliance and technology to see the backstories and guts of the problems.  Looking at all such reports helps to provide a more comprehensive view necessary for making good decisions. (more…)

Reining In Mobile Computing Risks

Sunday, October 3rd, 2010

As demonstrated over and over again over the past several years, mobile computing devices and storage media present a huge risk to business and personal information.  Because of the portability of these devices, organizations are basically entrusting the security of the information stored upon them into the hands of the people using them.  It is vital that an effective mobile computing device and storage media security and privacy management program is in place.

A mobile computing device and storage media security and privacy management program should be able to answer the questions: (more…)

Info Sec and Privacy Concerns For Mobile Workers

Monday, December 1st, 2008

A couple of weeks ago, while I was at the CSI Annual conference doing sessions and giving my 2-day class there, I took some time to do an interview with Mike Brennan at Michigan Tech News radio about the keynote I did the week before in Kalamazoo, MI; the podcast of it was just posted today…

(more…)

Tell Personnel How to Protect Mobile Computing Devices and Storage Media

Tuesday, June 24th, 2008

You can’t expect your personnel to know how to safeguard information and computing devices if you do not tell them *HOW* to safeguard them!
Humans are not born with an inherent instinct to automatically safeguard information assets. In fact, some folks seem to be born with a pre-disposition to fling caution to the wind when it comes to protecting information. Why else would someone drink three tall beers while working alone in a busy airport bar/restaurant and then leave their laptop completely unsecured on the table top to go somewhere else down the hallway out of sight for 30 minutes? (Saw this on a recent trip.) Yes, I know the alcohol had some impact on their decision-making, but think about all the folks in your organization who have a tendency to do risky activities even without the influence of alcohol.
The fourth section from the second article in the June issue of my “IT Compliance in Realtime Journal” discusses why all organizations must provid training and ongoing awareness communications to their personnel for how to protect mobile computing devices.
You cannot expect your personnel to know how to safeguard information and mobile computers if you do not provide them with training and ongoing awareness for how to do it! Deja vu…did I already say this? You bet; and I’ll probably say it a few million times more in my lifetime because it is so important, yet so seldom considered!
Here’s an unformatted version; you can download a much nicer PDF version of it with the entire June Journal

(more…)

Make Your Personnel Aware Of Mobile Computing Security Requirements

Monday, June 23rd, 2008

If you don’t encrypt sensitive and personally identifiable information (PII) on mobile computers, you are at very high risk of having that information breached. It seems that laptops practically scream “Take me!” to any potential swindler who happens to pass by. Yet one more in the daily news reports about mobile computer thefts provides a good example of this; “World’s Largest Telco Admits – We Didn’t Encrypt Laptop Data
The third section from the June issue of my “IT Compliance in Realtime Journal” discusses why all organizations that use mobile computing devices for business purposes must ensure their personnel know and understand how to use mobile computers in a secure manner. You cannot expect your personnel to know how to safeguard information and mobile computers if you do not provide them with training and ongoing awareness for how to do it!
Here’s an unformatted version; you can download a much nicer PDF version of it with the entire June Journal…

(more…)

Six Ways Organizations Can Lessen Mobile Computing Risks

Friday, June 20th, 2008

Geesh, every single day there is at least one news report about a stolen or lost mobile (laptop, notebook, PDA, Blackberry, etc.) computer! Today one of the reports was about a laptop computer, containing cleartext information about 11,000 hospital patients, that was stolen from a doctor’s home in Staffordshire, U.K.
A couple of days ago I posted the first section from the second article in my “IT Compliance in Realtime” journal issue for June.
Here’s the second section from that article…

(more…)

Mobile Computing Security Problems Exist Throughout the World

Wednesday, June 18th, 2008

Every day, literally, I read news reports about lost or stolen laptops. Today is no exception. The news report, “A Misconfigured Laptop, a Wrecked Life,” chronicles how one man had his first work laptop stolen, and then he was fired when the second work laptop he was issued as a replacement was found to have pornography on it…either it was pre-loaded when he got it, or lack of prevention software allowed someone to remotely load it on his computer while he was online.

(more…)

Data Will Always Be Less Safe In The Future…I Don’t Want To Get Gussied Up To Talk On The Phone

Wednesday, October 17th, 2007

I have a blog problem…there are way too many things I want to blog about and not enough hours in the day to do it! Throughout each day I note news items from the TV, or website news articles, or research, or reports, or just observations while at businesses or in public, and I only have a chance to blog about a small fraction of them. Today I think I’ll just briefly mention five of the topics I’ve planned to blog about, along with a brief note about each, and then maybe I’ll be able to revisit them sometime in the near future and discuss them at greater length.

(more…)

Improve Security to Make the Planet Greener

Monday, July 9th, 2007

This weekend there was a lot of attention on the environmental crisis facing the planet. There was the Live Earth concert on 07/07/07. Tonight the news was filled with more talk of new laws and initiatives, such as banning bottled water in restaurants in some of the states.

(more…)