Posts Tagged ‘hacker’
Monday, December 22nd, 2014
Too many businesses have poor information security controls in place (e.g,. demonstrably Sony, Staples, and a seemingly infinite number of other companies) and are basically giving their intellectual property, and the personal information they are responsible for, away.
A recent Sailpoint survey reveals that: (more…)
Tags:breach, cybersecurity, Dropbox, Google Docs, hack, hacker, HIPAA, HITECH, Information Security, privacy, privacy awareness, privacy training, Rebecca Herold, security awareness, security incident, security training
Posted in Cybersecurity, Information Security | No Comments »
Tuesday, February 25th, 2014
Recently I’ve heard in various discussion venues the argument that information security controls are an impediment to technology use, and that instead we should look at demotivating the hackers. With specific regard to medical devices, one commenter stated that generally, the best “bet in defending medical devices (as well as financial systems) is making the information useless/pointless for the attackers.” This is a dangerous attitude, and minimizes the true value of data on the devices.
Considering data on any type of computing device is considered (more…)
Tags:audit, awareness, compliance, data protection, due diligence, hack, hacker, hacking, IBM, Information Security, information security policy, infosec, laws, medical device, midmarket, mobile device, non-compliance, outsourcing, penalties, personal information identifier, personal information item, policies, privacy, privacy policy, privacy professor, privacyprof, punishment, Rebecca Herold, risk assessment, risk management, sanctions, security, security procedure, training, vendor
Posted in Information Security, privacy | No Comments »
Wednesday, February 25th, 2009
Today I spent a lot of time in phone meetings and doing research. So, instead of focusing on writing about one topic today, here are my tweets I sent out, that cover a wide range of topics…
(more…)
Tags:audits, awareness and training, hacker, Information Security, IT compliance, IT training, OECD, policies and procedures, privacy training, risk management, security training
Posted in Information Security, Miscellaneous, Privacy and Compliance | No Comments »
Wednesday, February 25th, 2009
Today I spent a lot of time in phone meetings and doing research. So, instead of focusing on writing about one topic today, here are my tweets I sent out, that cover a wide range of topics…
(more…)
Tags:audits, awareness and training, hacker, Information Security, IT compliance, IT training, OECD, policies and procedures, privacy training, risk management, security training
Posted in Information Security, Miscellaneous, Privacy and Compliance | No Comments »
Tuesday, January 6th, 2009
Yesterday Twitter reported here and here that several (33 to be exact) Twitter accounts were hacked into. This is in addition to the current, but separate, Twitter phishing…otherwise known as “twishing“…exploit that is simulatenously going on.
(more…)
Tags:awareness and training, Barack Obama, Britney Spears, hacker, Information Security, IT compliance, IT training, policies and procedures, privacy training, risk management, security training, twitter
Posted in Information Security, Privacy Incidents | No Comments »
Wednesday, October 8th, 2008
Around September 10 a widely-reported story broke about how Sarah Palin’s Yahoo! email account was broken into.
Contents of some of her email messages were then widely posted to various Internet websites.
(more…)
Tags:awareness and training, email privacy, email security, hacker, Information Security, IT compliance, IT training, kernell, policies and procedures, privacy training, risk management, Sarah Palin, security training
Posted in Information Security, Laws & Regulations, Privacy and Compliance | 2 Comments »
Friday, February 8th, 2008
Here’s an interesting juxtaposition of hacker-related news articles…
When scanning today’s news I saw the headline, “Teen Is World’s Youngest ‘Ethical Hacker’”
(more…)
Tags:awareness and training, ethical hacker, hacker, Information Security, IT compliance, policies and procedures, privacy, privacy policy, risk management, security awareness, security training, Shane Kelly
Posted in Information Security, Training & awareness | No Comments »
Sunday, June 3rd, 2007
I remember reading in an issue of 2600 The Hacker Quarterly magazine several years back about how easy it is to commit crime, without being noticed, by hacking poorly secured web sites.
Hacking is often viewed to be a safe, almost anonymous, type of crime that is often very hard to pin upon one individual.
(more…)
Tags:awareness and training, Business Wire, cybercrime, hacker, Information Security, IT compliance, policies and procedures, privacy, risk management, SEC, secure applications
Posted in government, Information Security | No Comments »
Wednesday, March 14th, 2007
Today a press release caught my eye, “Hackers get bum rap for corporate America’s digital delinquency.”
Hmm…sounds interesting. Let’s see what is behind this nicely-hooking title.
(more…)
Tags:awareness and training, data breach, hacker, Information Security, IT compliance, policies and procedures, privacy, privacy breach, regulatory compliance, risk management
Posted in Information Security, Privacy Incidents | 2 Comments »
Thursday, February 15th, 2007
There’s been enough interesting information security and privacy news here in my own frigid (subzero) snowy back yard in central Iowa to keep me from looking beyond the state for discussion material. Well yes, I did look beyond anyway…what I found will wait until another day.
Yesterday was interesting in that the Iowa Department of Education announced a security breach into their GED database and the Microsoft versus Comes/Iowa class action lawsuit was settled out of court.
(more…)
Tags:awareness and training, government, hacker, Information Security, Iowa, IT compliance, lawsuit, logs, Microsoft, policies and procedures, privacy, privacy breach
Posted in government, Information Security, Privacy and Compliance, Privacy Incidents | No Comments »