I thought it was pretty silly to read over the past few weeks that President Obama was being pressured to give up his Blackberry because of security reasons. If information security controls are properly implemented, then there is no reason that the president of the U.S., or any other person for that matter, should not use a smartphone!
I was happy to see the following article published by CNN…
Posts Tagged ‘Barack Obama’
Business Info Fact Of The Day: Smartphones CAN Be Used Securely!
Friday, January 23rd, 2009Tags:awareness and training, Barack Obama, blackberry, Information Security, IT compliance, IT training, policies and procedures, privacy training, risk management, security training, smartphone security
Posted in government, Information Security | No Comments »
Random thoughts: Network or security changes on inauguration day (1/20)?
Saturday, January 17th, 2009I was at an ISACA meeting earlier this week, and over lunch I got into an interesting conversation with a group there about whether or not streaming video feeds were going to be allowed or blocked at the firewall during the inauguration of Barack Obama as U.S. president this coming Tuesday. Some views were that it was an historic event, that most people would not be working any way, and that to maintain goodwill with personnel the streaming videos would be allowed. Others said they would block the streaming video to maintain workable bandwidth, but they were setting up TV monitors throughout the facilities to allow personnel to view if they so chose to; allowing no network impact to others in the company who continued to work.
Tags:awareness and training, Barack Obama, inauguration, Information Security, IT compliance, IT training, policies and procedures, privacy training, risk management, security training
Posted in government, Information Security | No Comments »
Twitter Accounts Hacked; Including Barack Obama’s and Britney Spear’s
Tuesday, January 6th, 2009Yesterday Twitter reported here and here that several (33 to be exact) Twitter accounts were hacked into. This is in addition to the current, but separate, Twitter phishing…otherwise known as “twishing“…exploit that is simulatenously going on.
Tags:awareness and training, Barack Obama, Britney Spears, hacker, Information Security, IT compliance, IT training, policies and procedures, privacy training, risk management, security training, twitter
Posted in Information Security, Privacy Incidents | No Comments »
There’s No Good Reason Why Barack Obama Should Give Up His BlackBerry
Wednesday, November 19th, 2008If security is done effectively and correctly, this is just silly…
Tags:awareness and training, Barack Obama, BlackBerry security, email communications, email security, Information Security, IT compliance, IT training, policies and procedures, privacy training, risk management, security training
Posted in government, Information Security | No Comments »
Obama’s and McCain’s Data Protection Plans
Monday, October 27th, 2008Something that I want to know about the U.S. presidential candidates, along with all their views and plans for the economy, education, healthcare, defense and so on, is what their plans are for information security and privacy protections. The past 8 years certainly has been a mixed bag of impacts for privacy and information safeguards.
Tags:awareness and training, Barack Obama, Information Security, IT compliance, IT training, John McCain, policies and procedures, privacy training, risk management, security training
Posted in government | No Comments »
Insider Threat Example: Obama’s Campaign Folks Make Email Mistake
Wednesday, October 15th, 2008No matter how much technology you throw at trying to prevent security incidents, the weakest link in the organization, your personnel (who could be your strongest link with effective training and ongoing awareness) can defeat that security technology.
On purpose, because of lack of knowledge, or by making a plain ol’ mistake.
And EVERYONE makes mistakes. Fewer if they are more diligently aware though.
Tags:awareness and training, Barack Obama, email mistakes, Information Security, insider threat, IT compliance, IT training, policies and procedures, politics, privacy training, risk management, security training
Posted in Information Security, Training & awareness | No Comments »
Passport Breach: Poor Security Practices Lead To Privacy Breaches
Sunday, March 23rd, 2008The breach of the presidential candidates’ passport files were widely reported over the past few days, such as here and here, not to mention the many postings referencing it as “passport-gate” throughout the blogosphere and the political implications. However, based upon what I’ve been reading it looks more like the result of a poor, inadequate and vulnerable information security program.
There are many information security and privacy issues involved with this incident. It would make a great case study to use at a joint meeting with your information security, privacy and compliance folks. Some of the questions to include in your discussion could include…
Tags:Analysis Corp, applications security, awareness and training, Barack Obama, Hillary Clinton, Information Security, IT compliance, John McCain, passport-gate, policies and procedures, privacy breach, risk management, security awareness, security training, Stanley Inc
Posted in Information Security, Privacy and Compliance, Privacy Incidents | No Comments »
The Iowa Caucus Experience in Madison County: Cameras Not a Factor
Friday, January 4th, 2008Well, after over a year of fervent campaigning by many presidential hopefuls, the Iowa caucuses are over! As I mentioned a couple of days ago I have never declared a party before, but this year I wanted to be part of the caucus experience. I wanted to participate and see first-hand what it was like and not just have some political pundits from the east or west coasts giving their inaccurate opinions of what really goes on.
Tags:awareness and training, Barack Obama, Bill Richardson, democrats, Hillary Clinton, Information Security, Iowa caucus, IT compliance, John Edwards, policies and procedures, privacy, republicans, risk management, security awareness, security training, wired, YouTube
Posted in Miscellaneous | 1 Comment »
Compliance and Information Security: Common Sense Confirmed
Thursday, July 26th, 2007So many times I’ve heard business leaders complain that the data protection requirements within the multiple laws and regulations only hurt business; that they are not necessary and have no true impact on really protecting data…they are just bureaucratic hoops forced upon businesses to placate the politicians’ constituents by lawmakers who know nothing about the nuts and bolts of implementing information security…and that the cost of compliance is only hurts the business’ bottom line.
Hmm…
Tags:awareness and training, Barack Obama, data loss, Hillary Clinton, Information Security, Iowa State Fair, IT compliance, Jim Hurley, John Edwards, John McCain, Mitt Romney, policies and procedures, privacy, privacy breach, regulatory compliance, risk management, Rudy Giuliani, security benchmark
Posted in Information Security, Privacy and Compliance | No Comments »