Blog Posts Tagged with "Data Protection"

D13f77e036666dbd8f93bf5895f47703

Making Sense of Data Storage in the Cloud

June 11, 2012 Added by:Theresa Payton

How should you protect your precious digital files? The good news is there are many services to choose from. Here is just a short list to review so you can pick what is best for you based on storage options, privacy and security features, and budget...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

How Mobile Apps are Invading Your Privacy: An Infographic

June 08, 2012 Added by:Fergal Glynn

With millions of mobile apps receiving billions of downloads, it is important that users are aware of the risks they face when downloading and using apps. This infographic uses real world cases to outline the threat to user privacy posed by mobile apps...

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Making Mobile Health Security Possible

May 20, 2012 Added by:Patrick Oliver Graf

It’s no secret that healthcare is going mobile. If hackers or disloyal employees scan or manipulate health data that is sent via mobile applications, the consequences can range from embarrassment to death. Ensuring these connections are secure is absolutely critical...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Six Good Reasons to De-Identify Data

May 08, 2012 Added by:Rebecca Herold

Even though it sounds complicated there are many good methods you can use to accomplish de-identification. The great thing is, under many legal constructs de-identification is an acceptable way to use personal information for purposes beyond which the personal data was collected...

Comments  (2)

A88973e7d0943d295c99820ab9aeed27

Protecting Data in Use

April 26, 2012 Added by:Simon Heron

The security of data in use is about risk mitigation. However, with the current targeted attacks and the proliferation of zero day threats, the risk level is high. It is necessary that action is taken to implement the required precautions that reduce the risk to an acceptable level...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

The Security, Privacy and Legal Implications of BYOD

April 24, 2012 Added by:David Navetta

Some organizations believe that BYOD will allow them to avoid significant costs. Other companies believe that company data on personal devices is inevitable. Unfortunately, BYOD raises significant data security concerns which can lead to potential legal risk...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

On Data Breach Containment

April 12, 2012 Added by:Rafal Los

You've heard us say for a while now that information security isn't about reaching some mythical state of 'secure' but rather a constant battle on the ever-changing front lines of your organization to minimize any damage that the evil hackers can do once they find an in...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Encryption: Myths and Must Knows

April 11, 2012 Added by:Rebecca Herold

Small to medium sized businesses have legal obligations to protect sensitive information, such as personally identifiable information. Here are some of the common long-held myths related to encryption misconceptions...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Megaupload Goes to Court: A Primer

April 11, 2012 Added by:Electronic Frontier Foundation

Does the government have a responsibility to protect innocent third parties from collateral damage when it seizes their property in the course of prosecuting alleged copyright infringement? That is the question a federal district court will consider...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Beyond the Firewall – Data Loss Prevention

April 05, 2012 Added by:Danny Lieberman

It doesn’t matter how they break into your network or servers – if attackers can’t take out your data, you’ve mitigated the threat. This paper reviews the taxonomies of advanced content flow monitoring that is used to audit activity and protect data inside the network...

Comments  (0)

37d5f81e2277051bc17116221040d51c

P2P File Sharing Security Concerns for Small Businesses

April 04, 2012 Added by:Robert Siciliano

In my own P2P security research, I have uncovered tax returns, student loan applications, credit reports and Social Security numbers. I’ve found family rosters which include usernames, passwords and Social Security numbers for entire family...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Cloud Security: Forecast Sunny with Possibility of Showers

April 04, 2012 Added by:Fergal Glynn

Even as companies are adapting to this new paradigm, there are growing concerns about the safety of their data in the cloud. Incidents at cloud service providers like Dropbox highlight dangers of storing information in the cloud...

Comments  (0)

Bddc4983168ae96da4b83bdd01b51548

Pump Up Your P@$$w0rd$

April 03, 2012 Added by:Kevin Doel

The idea is to choose phrase that you will be able to remember and a simple algorithm for converting it to a strong password. Even the best encryption systems are not going to protect your data if you use weak passwords and a hacker gains physical access to your mobile device...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

NIST: Technical Guidance for Evaluating Electronic Health Records

April 03, 2012 Added by:Infosec Island Admin

“This guidance can be a useful tool for EHR developers to demonstrate that their systems don’t lead to use errors... It will provide a way for developers and evaluators to objectively assess how easy their EHR systems are to learn and operate, while maximizing efficiency...”

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

CISSP Reloaded Domain 4: Cryptography

March 28, 2012 Added by:Javvad Malik

Cryptography, the dark art of information security. The deus-ex-machina, the silver bullet, the be all and end all of all security measures, so profound cryptography was first classed as a munitions. Widely misunderstood, often poorly implemented...

Comments  (1)

Bddc4983168ae96da4b83bdd01b51548

Shutting Front and Back Door Access to Your Mobile Devices

March 27, 2012 Added by:Kevin Doel

A lost or stolen phone constitutes a serious security threat to the information on the device because the attacker has unlimited time to gain access to the secrets that are stored therein. Important personal information should not be stored in any unsecured note application...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »