It has been widely reported and blogged about how an old United Airlines story was posted with huge stock value loss…
Posts Tagged ‘Information Security’
A $1 Billion Access Control Mistake
Monday, September 15th, 2008Miscellaneous Cybercrime & Privacy Tidbits
Friday, September 12th, 2008For the last day of Global Security Week (GSW) I’m providing a few items that relate to cybercrime that I find interesting…
GSW Logo
Wednesday, September 10th, 2008I really like the logo for this year’s GSW, and I wanted to include it here for those of you who had not see it…
Sloppy Disposal Aids Cybercriminals
Wednesday, September 10th, 2008For day 3 of Global Security Week I want to talk a little bit about the importance of securely disposing of your papers and storage media that contains personal information…
Not Enough Police To Deal With Cybercrime
Monday, September 8th, 2008Here’s an interesting article about cybercrime to kick off Day 1 of Global Security Week…
How Does Your Business Use Customer and Consumer Profiling?
Friday, September 5th, 2008So, do you know how your business may be using data mining for customer and consumer profiling? Have you talked with your marketing folks about it?
Do you know how the stores you make your purchases from use your information to do customer profiling and other types of data mining? Have you asked them? Chances are the sales staff at the counters and check-outs wouldn’t know, but you could ask the store manager.
Not All Privacy Issues Involve PII
Thursday, September 4th, 2008There’s been a lot in the news over the past few years about customer profiling. The term is used somewhat differently by different groups and the definition often debated. However, the mainstream news media generally uses the term to talk about how companies gather many different types of information related to consumers, and then use that information to make determinations about groups of people in various demographics, and even be able to narrow down certain activities to specific individuals when enough data, and it does not need to be personally identifiable information (PII), is collected.
5 Easy Things To Do for Global Security Week, September 8 – 12
Tuesday, September 2nd, 2008Next week is Global Security Week!
Do you have anything planned for your organization to help raise the awareness of all types of security issues?
Here are a few ideas I wanted to pass along to you…
The Power of Logs: IRS Examiner Sentenced & Fined For Accessing PII Without Authorization
Monday, September 1st, 2008Now, here’s a great example of an organization actually following through on their procedures to review access logs, and then to apply sanctions and take necessary other actions in response to non-compliance with not only organizational policies, but also with applicable laws…