On November 18 President Bush signed Executive Order 13478; see how/if it impacts your organization and how you use social security numbers (SSNs), and how it will impact how you require SSNs. And now you personall should NOT need to provide SSNs as often…
Posts Tagged ‘privacy training’
A New Risk Management Standard Worth Looking At
Saturday, November 29th, 2008The bulk of data protection laws and regulations require that security and privacy controls be established based upon the organization’s existing and unique risks. Many organizations struggle to find a way to effectivevly determine the risks that exist for their businesses. Often what results is similar to taking a shot in the dark to determine risks.
Are Cybercriminals Willing To Risk Death?
Friday, November 28th, 2008Whoa…here’s what should be a good cybercrime deterrent…
Healthy Paranoia: A Nice Note That Brightened My Day!
Wednesday, November 26th, 2008Recently I was pleasantly surprised to receive the following message…
Healthy Paranoia: A Nice Note That Brightened My Day!
Wednesday, November 26th, 2008Recently I was pleasantly surprised to receive the following message…
Cloud Computing & Privacy
Monday, November 24th, 2008While doing some research on cloud computing and considering the privacy and information security implications, I ran across a recent (11/18/2008) report from the Constitution Project, “Liberty and Security: Recommendations for the Next Administration and Congress“.
The following is an excerpt from page 184…
Cloud Computing & Privacy
Monday, November 24th, 2008While doing some research on cloud computing and considering the privacy and information security implications, I ran across a recent (11/18/2008) report from the Constitution Project, “Liberty and Security: Recommendations for the Next Administration and Congress“.
The following is an excerpt from page 184…
Cloud Computing & Privacy
Monday, November 24th, 2008While doing some research on cloud computing and considering the privacy and information security implications, I ran across a recent (11/18/2008) report from the Constitution Project, “Liberty and Security: Recommendations for the Next Administration and Congress“.
The following is an excerpt from page 184…
Vishing Very Vicious
Sunday, November 23rd, 2008Ah, the fun and joys of texting, and everything else that accompanies cell phones and smart phones!
The dirty dogs who created phishing saw great opportunity to move their electronic social engineering scam to the phone to try and dupe anyone who falls for their seductive lures of saving large sums of money, winning huge pots of money, or otherwise seeing or participating in salacious activities and fun. Vishing criminals also try tactics of scaring you into giving them your personally identifiable information (PII) by threatening you with lawsuits, or worse.