Last night when I got the following news, it really made my day! 🙂
2008 Best Privacy Advisers Survey
December 7th, 2008Study Highlights Too-Common Problem: Boards And Executives Do Not Understand Info Sec & Privacy Risk
December 5th, 2008My long-time friend, Richard Power, recently published an article in CSO magazine about a recent study he and Jody Westby did at Carnegie-Mellon in his Cylab center…
HIPAA Violation: Healthcare Worker Writes About Patients On MySpace
December 4th, 2008What was this worker for a healthcare provider thinking…didn’t/doesn’t the provider provide any kind of information security or privacy training or awareness communications…?
25% Of Workers Ignore Internet Use Policies
December 3rd, 2008A couple of days ago Asylum reported…
An SMB PCI DSS Learning Opportunity
December 2nd, 2008{Wow…love a chance to use 3 initializations in a row… 🙂 }
Over the past week I have been getting my holiday shopping done, almost entirely all online. I love to find unique stores, often small and medium sized businesses (SMBs) with interesting items, and I found one small store in Florida that makes some great, creative photo items at a reasonable price. Their online site was a little hard to navigate, though, so I spent a little time doing a bit of research about the store. They have been around since the 1980’s, and I could find no complaints about them. Their order form encrypted the input, but it was hard to figure out how to fill it in; I couldn’t get more than one photo uploaded to order more than one ornament, coffee mug, etc., at one time…
Info Sec and Privacy Concerns For Mobile Workers
December 1st, 2008A couple of weeks ago, while I was at the CSI Annual conference doing sessions and giving my 2-day class there, I took some time to do an interview with Mike Brennan at Michigan Tech News radio about the keynote I did the week before in Kalamazoo, MI; the podcast of it was just posted today…
A New Risk Management Standard Worth Looking At
November 29th, 2008The bulk of data protection laws and regulations require that security and privacy controls be established based upon the organization’s existing and unique risks. Many organizations struggle to find a way to effectivevly determine the risks that exist for their businesses. Often what results is similar to taking a shot in the dark to determine risks.
Are Cybercriminals Willing To Risk Death?
November 28th, 2008Whoa…here’s what should be a good cybercrime deterrent…
Healthy Paranoia: A Nice Note That Brightened My Day!
November 26th, 2008Recently I was pleasantly surprised to receive the following message…