Archive for the ‘Information Security’ Category

Have You Looked In Your Trash Bins Lately?

Monday, February 18th, 2008

It shouldn’t still amaze me, but it does, how often so many organizations just dump huge amounts of printed paper containing tons of personally identifiable information (PII) right into their dumpster sitting behind their building, in the alley, or some other easily reachable public location.
Here’s yet another example of a business throwing away people’s privacy in their trash dumpster…

(more…)

Identity Theft #1 Consumer Fraud Complaint To FTC in 2007

Friday, February 15th, 2008

This week the FTC released the list of the top 20 consumer fraud complaints they received in 2007.
Not surprisingly, identity theft topped their list, accounting for 32% of all the complaints.

(more…)

New Best Practices Guide For Building Secure Software

Thursday, February 14th, 2008

Many information security incidents and privacy breaches occur as a result of exploiting vulnerabilities in poorly engineered applications and systems.
It is good to see more articles and information about how to build security into applications from the very inception of a project, and continue it through the entire applications and systems lifecycle.

(more…)

U.S. DoD Workers Give Military Secrets To China

Monday, February 11th, 2008

Here are two more insider threat incident examples to put into your files and use within your information security and privacy training curriculum and awareness communications:

(more…)

Two Types Of Young Hackers

Friday, February 8th, 2008

Here’s an interesting juxtaposition of hacker-related news articles…
When scanning today’s news I saw the headline, “Teen Is World’s Youngest ‘Ethical Hacker’

(more…)

More Info Security & Privacy Education Will Reduce The Numbers Of Incidents

Thursday, February 7th, 2008

Here’s a good article for all information security and privacy pros to read and show their business leaders. If nothing else show them the last paragraph:

(more…)

Today Google Provides Another Path For Data Leakage

Thursday, February 7th, 2008

Here’s one more thing for IT, Information Security and Privacy folks to put on their list of things to worry about…

(more…)

Encryption So Easy Even A Terrorist Can Use It

Tuesday, February 5th, 2008

It seems all business leaders would understand by now, after literally thousands of privacy incidents in recent years, that they need to encrypt personally identifiable information (PII) stored on mobile computers and mobile storage devices, and when sending PII through networks.
Even the bad guys understand this.

(more…)

Don’t Let Your Folks Fall For This Scary Spam

Friday, February 1st, 2008

Today I got a death threat email message. This particular type of spam is not really new, but because they will be very scary for most people to get, many recipients will fall for them.
The address header and text of the message reads:

(more…)

Were You Taken Offline?

Thursday, January 31st, 2008

Today, “Internet failure hits two continents
Were you impacted? If you were, then you probably aren’t reading this right now… 🙂

(more…)