Blog Posts Tagged with "Data Protection"


Making Sense of Data Storage in the Cloud

June 11, 2012 Added by:Theresa Payton

How should you protect your precious digital files? The good news is there are many services to choose from. Here is just a short list to review so you can pick what is best for you based on storage options, privacy and security features, and budget...

Comments  (0)


How Mobile Apps are Invading Your Privacy: An Infographic

June 08, 2012 Added by:Fergal Glynn

With millions of mobile apps receiving billions of downloads, it is important that users are aware of the risks they face when downloading and using apps. This infographic uses real world cases to outline the threat to user privacy posed by mobile apps...

Comments  (0)


Making Mobile Health Security Possible

May 20, 2012 Added by:Patrick Oliver Graf

It’s no secret that healthcare is going mobile. If hackers or disloyal employees scan or manipulate health data that is sent via mobile applications, the consequences can range from embarrassment to death. Ensuring these connections are secure is absolutely critical...

Comments  (0)


Six Good Reasons to De-Identify Data

May 08, 2012 Added by:Rebecca Herold

Even though it sounds complicated there are many good methods you can use to accomplish de-identification. The great thing is, under many legal constructs de-identification is an acceptable way to use personal information for purposes beyond which the personal data was collected...

Comments  (2)


Protecting Data in Use

April 26, 2012 Added by:Simon Heron

The security of data in use is about risk mitigation. However, with the current targeted attacks and the proliferation of zero day threats, the risk level is high. It is necessary that action is taken to implement the required precautions that reduce the risk to an acceptable level...

Comments  (0)


The Security, Privacy and Legal Implications of BYOD

April 24, 2012 Added by:David Navetta

Some organizations believe that BYOD will allow them to avoid significant costs. Other companies believe that company data on personal devices is inevitable. Unfortunately, BYOD raises significant data security concerns which can lead to potential legal risk...

Comments  (0)


On Data Breach Containment

April 12, 2012 Added by:Rafal Los

You've heard us say for a while now that information security isn't about reaching some mythical state of 'secure' but rather a constant battle on the ever-changing front lines of your organization to minimize any damage that the evil hackers can do once they find an in...

Comments  (0)


Encryption: Myths and Must Knows

April 11, 2012 Added by:Rebecca Herold

Small to medium sized businesses have legal obligations to protect sensitive information, such as personally identifiable information. Here are some of the common long-held myths related to encryption misconceptions...

Comments  (0)


Megaupload Goes to Court: A Primer

April 11, 2012 Added by:Electronic Frontier Foundation

Does the government have a responsibility to protect innocent third parties from collateral damage when it seizes their property in the course of prosecuting alleged copyright infringement? That is the question a federal district court will consider...

Comments  (0)


Beyond the Firewall – Data Loss Prevention

April 05, 2012 Added by:Danny Lieberman

It doesn’t matter how they break into your network or servers – if attackers can’t take out your data, you’ve mitigated the threat. This paper reviews the taxonomies of advanced content flow monitoring that is used to audit activity and protect data inside the network...

Comments  (0)


P2P File Sharing Security Concerns for Small Businesses

April 04, 2012 Added by:Robert Siciliano

In my own P2P security research, I have uncovered tax returns, student loan applications, credit reports and Social Security numbers. I’ve found family rosters which include usernames, passwords and Social Security numbers for entire family...

Comments  (0)


Cloud Security: Forecast Sunny with Possibility of Showers

April 04, 2012 Added by:Fergal Glynn

Even as companies are adapting to this new paradigm, there are growing concerns about the safety of their data in the cloud. Incidents at cloud service providers like Dropbox highlight dangers of storing information in the cloud...

Comments  (0)


Pump Up Your P@$$w0rd$

April 03, 2012 Added by:Kevin Doel

The idea is to choose phrase that you will be able to remember and a simple algorithm for converting it to a strong password. Even the best encryption systems are not going to protect your data if you use weak passwords and a hacker gains physical access to your mobile device...

Comments  (2)


NIST: Technical Guidance for Evaluating Electronic Health Records

April 03, 2012 Added by:Infosec Island Admin

“This guidance can be a useful tool for EHR developers to demonstrate that their systems don’t lead to use errors... It will provide a way for developers and evaluators to objectively assess how easy their EHR systems are to learn and operate, while maximizing efficiency...”

Comments  (0)


CISSP Reloaded Domain 4: Cryptography

March 28, 2012 Added by:Javvad Malik

Cryptography, the dark art of information security. The deus-ex-machina, the silver bullet, the be all and end all of all security measures, so profound cryptography was first classed as a munitions. Widely misunderstood, often poorly implemented...

Comments  (1)


Shutting Front and Back Door Access to Your Mobile Devices

March 27, 2012 Added by:Kevin Doel

A lost or stolen phone constitutes a serious security threat to the information on the device because the attacker has unlimited time to gain access to the secrets that are stored therein. Important personal information should not be stored in any unsecured note application...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »
Most Liked