Posts Tagged ‘IT compliance’

Make Your Personnel Aware Of Mobile Computing Security Requirements

Monday, June 23rd, 2008

If you don’t encrypt sensitive and personally identifiable information (PII) on mobile computers, you are at very high risk of having that information breached. It seems that laptops practically scream “Take me!” to any potential swindler who happens to pass by. Yet one more in the daily news reports about mobile computer thefts provides a good example of this; “World’s Largest Telco Admits – We Didn’t Encrypt Laptop Data
The third section from the June issue of my “IT Compliance in Realtime Journal” discusses why all organizations that use mobile computing devices for business purposes must ensure their personnel know and understand how to use mobile computers in a secure manner. You cannot expect your personnel to know how to safeguard information and mobile computers if you do not provide them with training and ongoing awareness for how to do it!
Here’s an unformatted version; you can download a much nicer PDF version of it with the entire June Journal…

(more…)

Six Ways Organizations Can Lessen Mobile Computing Risks

Friday, June 20th, 2008

Geesh, every single day there is at least one news report about a stolen or lost mobile (laptop, notebook, PDA, Blackberry, etc.) computer! Today one of the reports was about a laptop computer, containing cleartext information about 11,000 hospital patients, that was stolen from a doctor’s home in Staffordshire, U.K.
A couple of days ago I posted the first section from the second article in my “IT Compliance in Realtime” journal issue for June.
Here’s the second section from that article…

(more…)

Mobile Computing Security Problems Exist Throughout the World

Wednesday, June 18th, 2008

Every day, literally, I read news reports about lost or stolen laptops. Today is no exception. The news report, “A Misconfigured Laptop, a Wrecked Life,” chronicles how one man had his first work laptop stolen, and then he was fired when the second work laptop he was issued as a replacement was found to have pornography on it…either it was pre-loaded when he got it, or lack of prevention software allowed someone to remotely load it on his computer while he was online.

(more…)

Hold Your Vendors To Their Promises

Tuesday, June 17th, 2008

Sometimes you just need to let a business know if their service or product is subpar. You should always let a business know if their product or service is downright rotten. You definitely need to let your vendors and business partners know if they are not meeting your expectations or contracted requirements. This certainly goes for not only our business partners at work, such as our software and hardware vendors, service providers, and outsourced entities, but also in our everyday lives.
Today I was motivated to write a pointed letter to a restaurant that I usually enjoy visiting. Here is what I wrote…

(more…)

100+ Hot Spots During A Short Drive Around Town

Monday, June 16th, 2008

Last Friday my 8-year-old son and I looked for a wifi hotspot to work from while my 11-year-old son was at band camp for the day (I didn’t want to waste gas by driving all the 25+ miles back home, and then driving into town again to pick him up at the end of the day). We discovered the IHOP close by actually has free wireless access…I did not know that! So, we had lunch there and I did work while we ate.

(more…)

Be Prepared…Is Your Disaster Recovery Plan Current?

Thursday, June 12th, 2008

I’ve been in Vermont this week at the Norwich University MSIA residency week.
It was storming and treacherous with tornadoes when I left my Iowa home on Sunday morning, and it took me two days to get to Vermont because of flight cancellations. Now I’m sitting at the Burlington, VT airport wondering if I will be able to make it home tonight, where Iowa is still experiencing horrific weather, and has sadly seen the tragedy of a tornado, last night, killing four and wounding close to fifty boy scouts at a wilderness camp there.

(more…)

Think and Look Before You Send that Quick Message!

Wednesday, June 11th, 2008

Every month, and sometimes weekly, I see a privacy breach that is a result of a messaging mistake. People need to be more careful about all the types of electronic messages they are sending and not so quick to hit that send button!
Here is the fourth, and final, part of the first article within the June issue of my “IT Compliance in Realtime” journal, “What to Tell Personnel: Messaging Security and Privacy“…

(more…)

Think and Look Before You Send that Quick Message!

Wednesday, June 11th, 2008

Every month, and sometimes weekly, I see a privacy breach that is a result of a messaging mistake. People need to be more careful about all the types of electronic messages they are sending and not so quick to hit that send button!
Here is the fourth, and final, part of the first article within the June issue of my “IT Compliance in Realtime” journal, “What to Tell Personnel: Messaging Security and Privacy“…

(more…)

Let Your Personnel Know Their Messaging Boundaries

Tuesday, June 10th, 2008

Here is the third part of the first article within the June issue of my “IT Compliance in Realtime” journal, “What to Tell Personnel: Messaging Security and Privacy“…

(more…)

Sending Clear Text Customer Information Is Not Okay Just Because the Customer Says It’s “Okay”

Monday, June 9th, 2008

As a follow-up to my blog post from last Friday, here is the second part of the first article within the June issue of my “IT Compliance in Realtime” journal, “What to Tell Personnel: Messaging Security and Privacy“…

(more…)