Posts Tagged ‘policies and procedures’

Surveillance and Managing Information With So Many Ways To Capture It

Wednesday, June 27th, 2007

Over the weekend a news story appeared in Australia that I’m sure is occurring in MANY other organizations, far beyond just schools; “Teachers being secretly filmed by students

(more…)

“Over 1 Million Computer Victims” Can Lead To Some Interesting, Awareness-Raising, Discussions

Tuesday, June 26th, 2007

Here’s a great conversation starter for a nice chat with your business leaders, “The FBI has found over 1 million computers are controlled by criminal botnets.”
Be prepared to answer some follow-up questions from your business leaders after telling them this, such as…

(more…)

First Person Convicted Under CAN-SPAM Is Sentenced to 70 Months in Federal Prison and Must Pay Over $1 Million

Tuesday, June 26th, 2007

On June 11, Jeffrey B. Goodin was ordered to pay $1,002,885.58 to the victims of his phishing scheme.

(more…)

New Social Engineering Scheme Targets Military Families

Monday, June 25th, 2007

Every week…sometimes daily…it seems there is a new type of social engineering attack targeting specific groups. The social engineering fraudsters are pretty creative and many adept at exploiting the vulnerabilities and weaknesses of these groups. They use face-to-face methods, phone calls, email messages, faxes, and any other communication path that could take them to a willing victim.

(more…)

Norwich University Residency Week & Thoughts On the Court Ruling on Email Searches

Thursday, June 21st, 2007

I’m a professor for the Norwich University MSIA program, and since Sunday I’ve been here in Vermont for their residency week, culminating in graduation on Friday. It has been a great week! It kicked off with a wonderfully thought-provoking discussion led by Karen Worstell, former CISO for Microsoft, as well as former CEO at AtomicTangerine, and many other high-profile positions.

(more…)

On The Internet, If It Looks, Quacks and Walks Like a Duck, Is It *REALLY* a Duck?

Wednesday, June 20th, 2007

I am a great believer of performing due diligence to ensure potential new hires have no deceptive or malicious skeletons in their past that may be reincarnated after they have been hired and entrusted with access to sensitive information and supporting resources. There are appropriate times organizations should do criminal background checks, education checks, and other checks as appropriate and legal for the position being filled and the location of the facility.

(more…)

Another Study Supports The Need for Awareness and Executive Support

Monday, June 18th, 2007

I’m always interested to read survey results related to information assurance. Of course the readers need to take the interpretations and summaries with a grain of salt; very few surveys are statistically representative of all organizations.

(more…)

Another Fun Security Awareness Site

Friday, June 15th, 2007

Here’s another great security awareness site pointed out by Dave Ockwell-Jenner in the Security Catalyst community:
the Security Cartoon site.

You Can Never Really Tell Who Gets Your Wireless Transmissions

Friday, June 15th, 2007

It was interesting to read about an elementary school science teacher in a Chicago suburb whose baby monitor picks up the video transmission from inside the space shuttle Atlantis.

(more…)

I Don’t Want Spam, Even If it Is “Certified” To be From a Legitimate Business

Thursday, June 14th, 2007

There are some vendors offering “certifications” to businesses to help get their marketing email past spam filters as well as to help prevent successful phishing exploits.

(more…)