Posts Tagged ‘security incident’
Monday, December 22nd, 2014
Too many businesses have poor information security controls in place (e.g,. demonstrably Sony, Staples, and a seemingly infinite number of other companies) and are basically giving their intellectual property, and the personal information they are responsible for, away.
A recent Sailpoint survey reveals that: (more…)
Tags:breach, cybersecurity, Dropbox, Google Docs, hack, hacker, HIPAA, HITECH, Information Security, privacy, privacy awareness, privacy training, Rebecca Herold, security awareness, security incident, security training
Posted in Cybersecurity, Information Security | No Comments »
Monday, January 26th, 2009
Over the past few months during some of my presentations I’ve discussed how easily PII can be stored on mobile storage devices that most business leaders and information security folks often do not think about or overlook. One of those devices is the innocent-looking and seemingly benign MP3 player, such as the cool ipod. You gotta love’em! I know I love mine. However, a couple of times when I talked about how easy it is to store large amounts of company data, including personally identifiable information (PII), onto MP3 players, I got some noticeable snickers and sneers from a few in the audience who apparently thought such an idea was preposterous!
Well, here are a couple of different news articles that demonstrates otherwise; both about the same incident, but each with slightly different information…
(more…)
Tags:awareness and training, Information Security, ipod security, IT compliance, IT training, mobile security, policies and procedures, privacy breach, privacy training, risk management, security incident, security training
Posted in Information Security, Privacy and Compliance, Privacy Incidents | No Comments »
Monday, January 26th, 2009
Over the past few months during some of my presentations I’ve discussed how easily PII can be stored on mobile storage devices that most business leaders and information security folks often do not think about or overlook. One of those devices is the innocent-looking and seemingly benign MP3 player, such as the cool ipod. You gotta love’em! I know I love mine. However, a couple of times when I talked about how easy it is to store large amounts of company data, including personally identifiable information (PII), onto MP3 players, I got some noticeable snickers and sneers from a few in the audience who apparently thought such an idea was preposterous!
Well, here are a couple of different news articles that demonstrates otherwise; both about the same incident, but each with slightly different information…
(more…)
Tags:awareness and training, Information Security, ipod security, IT compliance, IT training, mobile security, policies and procedures, privacy breach, privacy training, risk management, security incident, security training
Posted in Information Security, Privacy and Compliance, Privacy Incidents | No Comments »
Friday, March 30th, 2007
The Royal Academy of Engineering, located in London, recently released a report, “Dilemmas of Privacy and Surveillance: Challenges of Technological Change.”
I just ran across it and haven’t had a chance to review it in depth yet, but a quick scan and reading the executive summary shows some interesting thoughts.
(more…)
Tags:awareness and training, corporate governance, Information Security, IT compliance, privacy, privacy study, security incident, surveillance, trust
Posted in government, Information Security, Privacy and Compliance | No Comments »
Thursday, March 29th, 2007
The Ponemon Institute puts out an annual survey asking anyone who wants to participate in their online survey who the companies are that they believe respect their customers most and do the best job of protecting their privacy.
(more…)
Tags:awareness and training, breach response plan, corporate governance, Information Security, IT compliance, Ponemon study, privacy, security incident, trust
Posted in Privacy and Compliance | 2 Comments »