31st May 2014

0 Comments

China Hacking is Deep and Diverse, Experts Say

China’s internet espionage runs deeper and wider than the US indictment of five army officers last week. Washington considers China’s hacking activities as economic espionage. The Chinese army men indicted are part of a hacking…

Read More

30th May 2014

0 Comments

Is Your Web Site Optimized for Mobile Devices?

Mobile device sales are growing, desktop sales are declining. Is your company website ready to sell to mobile devices? Most traditional web sites are not ready to support the payment path for mobile devices. Are…

Read More

29th May 2014

0 Comments

Hospital Data Breach; why the dialysis machine opened accounts in your name.

Last time I told you a little bit about why the credit card theft industry is a lot more lucrative and frightening than we initially suspected (to link to this blog click here). What I…

Read More

29th May 2014

0 Comments

Spotify says one user’s data accessed in systems breach

With 40 million users, Spotify reported unauthorized access to one account alerting concern about data security. CTO Oskar Stal said no vital information was accessed and said the company will continue beefing up security. The…

Read More

28th May 2014

0 Comments

HIPAA: What happens when you don’t comply?

HIPAA violations will cost both employers and employees if they make HIPAA-related lapses in judgment. Mobile devices and accounts like Facebook make it easier than ever for workers to be liable for HIPAA violations. Individuals,…

Read More

23rd May 2014

0 Comments

Report on 2013 Forecast 2014 Breach Threats

Mission of the PCI DSS since 2004 is to help merchants protect payment card data wherever and however it is stored. Bob Russo, General Manager of PCI, wants to make sure PCI compliance is centered…

Read More

21st May 2014

0 Comments

Special Report on 2013 Forecast 2014 Breach Threats

Review of 2013 and look at 2014 reveal compliance, (Big Data) and vulnerability (smaller data) these are the top two considerations.Big changes in PCI compliance standards are necessary to “stop the bleeding” in credit card…

Read More

20th May 2014

0 Comments

Should Companies Monitor Their Employees’ Social media?

If you are now or will be soon “hosting” a BYOD program at your company, look closely & often at the procedure. Nip security problems in the bud: staffing problems will get trickier. Hire up…

Read More

16th May 2014

0 Comments

The market for stolen credit cards

Once your credit card information is stolen, it is placed on the credit card black market. This market is increasingly user friendly and operates on websites that could be compared to the Amazon marketplace or…

Read More

16th May 2014

0 Comments

Breach Response: Building a Better Strategy

Lots of people are now looking at pre breach patches. What about post breach policy changes! Experian Data Breach resolution says big manufactories and small business are still lagging behind. Take your pulse! You say…

Read More

15th May 2014

0 Comments

I stole your credit card

After last year’s Target data breach resulted in millions of people losing credit card information, it became clear that criminals are looking for far more efficient frightening ways of stealing our credit card information. There…

Read More

15th May 2014

0 Comments

How Encryption Works

Encryption encodes information so only the person or computer with the key can decode it.The key to encryption is to use 2 keys, a private key and a public key to unlock the stored data. …

Read More

9th May 2014

0 Comments

UMass Medical Center Data Breach

On May 5, 2014 UMass Memorial Medical Center, located in Worcester, Massachusetts reported approximately 2,400 breached patient records. An employee of UMass Memorial Medical Center was thought to have accessed the files within the period…

Read More

8th May 2014

0 Comments

Dear United States, 400 Million Dollars? We can do better.

A few weeks ago, a middle school student by the name Suvir Mirchandani claimed to find that he could save his school district millions of dollars a year just by switching their font from Times…

Read More

8th May 2014

0 Comments

How the target CEO Resignation will affect other Execs

How do we emphasize the magnitude of unsafe data to our employees? Target CEO’s “Ouster” ought to do it! Targets CIO left the Company in March. That did not stop the bleeding. The top guy…

Read More

7th May 2014

0 Comments

“Encryption in the Cloud is scarcer than you think”

50% of policies say “Cloud Provider” is responsible for security when data goes to the cloud. Data can be encrypted before or after the trip to the cloud. In between are dragons. Be safe and…

Read More