Posts Tagged ‘encryption’
Wednesday, December 6th, 2006
A report in the Air Force Times indicates a laptop containing personally identifiable information (PII) about 1,000 West Virginia Air National Guard members was stolen during a training trip in November. The spokesperson for the Air National Guard indicated:
“The Air Force uses some of most sophisticated encryption processes to safeguard information on government computers”
…implying the data on the laptop was encrypted, but not coming right out and saying it was.
(more…)
Tags:awareness and training, credit reports, encrypt, encryption, Information Security, IT compliance, laptop security, laptop theft, PII, policies and procedures, privacy
Posted in Lost & Stolen Laptops, Privacy and Compliance | 2 Comments »
Friday, December 1st, 2006
On November 27 the Chicago Tribune reported:
“A printing contractor for the Chicago Public Schools said Sunday that it mistakenly mailed a list of names, Social Security numbers and home addresses of nearly 1,740 former school employees as part of a packet of health-insurance information to them.”
Oops! Another privacy breach resulting from a combination of human error and actions by an outsourced vendor.
(more…)
Tags:awareness and training, encryption, incident response, Information Security, IT compliance, policies and procedures, privacy breach
Posted in Privacy Incidents | No Comments »
Monday, November 13th, 2006
Last week I was at the Computer Security Institute 33rd Annual Computer Security Conference & Exhibition where Chris Grillo and I also gave our post-conference seminar, “Effectively Partnering InfoSec and Privacy For Business Success“. It was interesting to hear the folks attending both the conference and our seminar express their concerns related to information security and privacy. I am always intrigued by the various viewpoints of folks in not only different industries, but also of those who have very little experience in dealing with information security, privacy and compliance versus those with a great amount of experience. It is very noticeable how the viewpoints shift from trying to address primarily only technical issues (overwhelmingly those with little experience) to the viewpoint of incorporating the issues throughout the entire enterprise and into all processes through procedures, awareness and responsibilities (overwhelmingly those with much experience).
(more…)
Tags:awareness and training, encryption, information assurance, Information Security, IT compliance, policies and procedures, privacy, privacy incident
Posted in Privacy and Compliance | 1 Comment »
Tuesday, November 7th, 2006
Tags:awareness and training, breach response, encryption, Information Security, IT compliance, policies and procedures, privacy, stolen computer, Villanova incident
Posted in Privacy and Compliance | No Comments »
Friday, November 3rd, 2006
Thursday, 11/2, the VA confirmed a computer containing data about 1,600 U.S. military veterans was stolen from their Manhatten hospital.
According to the report, it was stolen from “a locked room in a locked hallway at the VA hospital. The theft occurred Sept. 6, but VA officials sent out a letter to veterans only within the past two weeks. The personal data of about 1,600 people was on the computer’s hard drive. It was the third theft of personal data from a VA facility in less than a year.”
(more…)
Tags:awareness and training, encryption, Information Security, IT compliance, policies and procedures, privacy, stolen computer, VA incident
Posted in Privacy and Compliance | No Comments »
Thursday, November 2nd, 2006
I am a big advocate of encryption. It is such a great tool for protecting sensitive and personally identifiable information (PII), particularly for such data that moves…while on mobile devices, storage devices, and while being transmitted through networks. Historically it was a challenge to implement.
In the past few years implementation has been getting much easier, and continues to improve. However, it is still no surprise, but yet a disappointment, that a recent study from Credant Technologies, Inc., yes, an encryption solution vendor, found that out of 426 IT practitioners interviewed throughout the world, 88% know sensitive data and PII is on their personnel’s mobile computers, but the only 20% have deployed encryption for such devices. Note the encryption is deployed; I would bet that the actual amount of PII and sensitive data encrypted on those devices is actually much lower.
(more…)
Tags:awareness and training, encryption, Information Security, IT compliance, mobile computer security, policies and procedures, privacy
Posted in Privacy and Compliance | 4 Comments »
Thursday, November 2nd, 2006
I am a big advocate of encryption. It is such a great tool for protecting sensitive and personally identifiable information (PII), particularly for such data that moves…while on mobile devices, storage devices, and while being transmitted through networks. Historically it was a challenge to implement.
In the past few years implementation has been getting much easier, and continues to improve. However, it is still no surprise, but yet a disappointment, that a recent study from Credant Technologies, Inc., yes, an encryption solution vendor, found that out of 426 IT practitioners interviewed throughout the world, 88% know sensitive data and PII is on their personnel’s mobile computers, but the only 20% have deployed encryption for such devices. Note the encryption is deployed; I would bet that the actual amount of PII and sensitive data encrypted on those devices is actually much lower.
(more…)
Tags:awareness and training, encryption, Information Security, IT compliance, mobile computer security, policies and procedures, privacy
Posted in Privacy and Compliance | No Comments »
Saturday, October 21st, 2006
A solution for addressing laptop thefts and losses was described in a press release today. The product uses GPS in combination with encryption to locate stolen and lost laptops quickly in addition to being able to delete sensitive files from lost or stolen computers.
I know nothing about this particular product, "MyLaptopGPS," beyond this press release, but the concept is good, and there may be other products out there that do the same thing. Security in layers does not just apply to networks; it applies to all aspects of information security.
In fact, with regard to mobile computing devices it is good to take MANY safeguards, a few of which include:
- Encrypt all sensitive data on the device. This often is most efficient to accomplish by encrypting the entire hard drive.
- Use boot and login passwords…GOOD passwords!
- Configure the device to automatically lock, requiring requiring password based re-authentication, after a specified period of inactivity. 5 or 10 minutes is reasonable.
- Use privacy screens to cut down the amount of information onlookers, nosy neighbors and other looky-loos can see, like on planes, in airports and so on.
- Use asset monitoring tags and services, such as StuffBak. The GPS product also serves a similar purpose.
- Require unique devices for each person; don’t allow the devices or passwords on the devices to be shared; this destroys accountability.
- Maintain an inventory of all mobile computing devices used, along with the data stored upon them.
- Do not allow mobile computin devices used for business to also be used for personal activities or to be shared with others, such as friends and family members.
- Do not allow employee-owned mobile computing devices to be used for business purposes. Organizations should own all the computing devices used for business purposes to ensure all business policies and procedures can be applied to them.
- Provide locking devices and other methods for physically protection mobile computing devices when personnel have them outside the more protected confines of the corporate facilities.
- Do not allow large amounts of PII to be stored on mobile computing devices.
- Implement malicious code prevention software and personal firewalls on mobile computing devices.
- Very importantly, provide awareness and training for your folks who use mobile computing devices!!! You can’t expect that they will provide appropriate safeguards if you do not tell them what the appropriate safeguards are that they need to take.
Technorati Tags
information security
IT compliance
policies and procedures
encryption
awareness and training
laptop theft
privacy
Tags:awareness and training, encryption, Information Security, IT compliance, laptop theft, policies and procedures, privacy
Posted in Information Security | No Comments »
Sunday, April 30th, 2006
In this episode I discuss how encryption supports compliance as well as effectively protects personal information. Encryption is an under-utilized security tool. Considering the infinite number of today’s risks, threats and vulnerabilities, encryption can effectively keep unauthorized individuals and systems from accessing sensitive information and thwart many types of attacks. In today’s business environment with sensitive information being stored in multiple locations, many of them mobile, encrypting information is an effective privacy safeguard organizations can add to their arsenal of safeguard tools. I also discuss incidents that occurred and how the laws, regulations, and regulatory bodies encourage the use of encryption.
Tags:compliance, data protection, encryption, information encryption, mobile, personal information protection, Podcast, privacy safeguards, regulations
Posted in Podcast | No Comments »