Skip to main content

Home/ CIPP Information Privacy & Security News/ Group items tagged Security

Rss Feed Group items tagged

Karl Wabst

Changes to Corporate Security - NIST vs. ISO 27000 - 0 views

  •  
    Today's post provides an example of an organizational change being discussed in many firms contemplating the use of social media, and its evolution to social business in a global economy. Adoption of "social" introduces new risks and opportunities to US corporations. The likelihood of doing business
Karl Wabst

Back To Our Future - 0 views

  •  
    This post is one in a series on Privacy & Security, and covers some of the intersections of these domains for those who are not practitioners with in-depth understanding of the associated disciplines.
    History Points to Privacy's Future
    Today's post explores the history of privacy a bit mor
Karl Wabst

Treat Data As Dollars - 0 views

  •  
    One of the things that always surprised me while working with corporate information over the years is the lack of a data classification program in the majority of firms. Working with many well-known corporations around the world, I get to see the inner-workings of how IT is practiced.

    One item I
Karl Wabst

Understand the 4 Barriers to Corporate Social Business Adoption - Before You Leap - 0 views

  •  
    Social, Social, Social! It seems everyone is talking about the need to adopt some flavor of Social to propel business forward. Unless you live under a very large rock, you are aware of the popularity of individual social media services. Many well-meaning companies are rushing forward to transform th
Karl Wabst

Top 10 tips for avoiding a costly security breach - 0 views

  •  
    "Strong data security policies and procedures are only as effective as the employees who implement them."
Karl Wabst

The road to electronic health records is lined with data thieves | Reuters Money - 0 views

  •  
    Ultimately, your first line of defense rests with your doctor, though, says Peel. To thwart breaches, pepper your doctor with questions. How will my data be transmitted? Will it be encrypted? For assistance, you can also download a question form at Patientprivacyrights.org.
Karl Wabst

Hackers Could Remotely Manipulate Medical Devices Used By Diabetics - 1 views

  •  
    Insulin pumps are vulnerable to determined hackers who could also remotely mess up the readings of blood-sugar monitors, Jerome Radcliffe, a security researcher who has diabetes revealed at the Black Hat computer security conference, Las Vegas, Nevada. In other words, a hacker could cause a diabetic patient to receive either too much or too little insulin.
Karl Wabst

Protecting data on copiers - SC Magazine US - 1 views

  •  
    Recent news reports on copier security have brought to the forefront how information stored on a copier's hard drive may be accessible to would-be identity thieves and others. While this vulnerability is eye-opening to many, this concern has been important to manufacturers for quite some time. Just as you would install a virus scan on your laptop or PC, you need data safeguards for multifunction printers (MFPs).
Karl Wabst

A must to avoid: Worst practices in enterprise data governance - 1 views

  •  
    More and more companies are recognizing that they're accumulating ever-increasing amounts of data but not necessarily gaining business insights from it. The missing link is the transformation of data into information that is comprehensive, consistent, correct and current. That isn't a problem technology can solve for you
Karl Wabst

Web tracking has become a privacy time bomb - USATODAY.com - 1 views

  •  
    The purpose for all of this online snooping is singular: Google, Microsoft, Yahoo, Apple, Facebook and others are intent on delivering more relevant online ads to each and every one of us - and bagging that advertising money.
Karl Wabst

Best Free Software for Protecting Your PC and Your Privacy | PCWorld - 1 views

  •  
    Worried about security, but unwilling to spend a bundle? No problem. With these 11 free programs, you'll keep your computer--and your wallet--safe.
Karl Wabst

MediaPost Publications Mobile Payments Growth Slower Than Expected 07/22/2011 - 0 views

  •  
    In advanced markets, the firm believes the promise of mobile payments driven by NFC technology is at least four years away from reaching mass adoption. "The biggest hurdle is the need to change user behavior by convincing consumers to pay with mobile phones instead of cash and cards," said Sandy Shen, research director at Gartner.
Karl Wabst

MILITARY: Pentagon takes lead in cybersecurity efforts - 0 views

  •  
    An explosion in threats against the nation's cybernetworks has led the Pentagon to develop a cyberwar strategy and prompted states to open cybersecurity offices.
Karl Wabst

Hackers New Target: Small Firms With Lax Security - WSJ.com - 0 views

  •  
    Recent hacking attacks on Sony Corp. and Lockheed Martin Corp. grabbed headlines. What happened at City Newsstand Inc. last year did not.

    Unbeknownst to owner Joe Angelastri, cyber thieves planted a software program on the cash registers at his two Chicago-area magazine shops that sent customer credit-card numbers to Russia. MasterCard Inc. demanded an investigation, at Mr. Angelastri's expense, and the whole ordeal left him out about $22,000.
Karl Wabst

Social Networks: Thinking Of The Children : NPR - 0 views

  •  
    Despite ominous reports of cyberbullying and "Facebook depression" among young people, the number of parents who are cool with their children - between the ages of 10 and 12 - having a social media account has doubled in a year.
Karl Wabst

Latest Legal Developments in Privacy, Data Collection and Security - Loeb & Loeb LLP - 0 views

  •  
    State and federal lawmakers continue to introduce bills regulating the collection, use and security of consumer and personal information. The proposed federal bills could change the national privacy framework. At the same time, regulators and the plaintiffs' bar remain focused on privacy and security issues and continue to initiate enforcement actions and class action suits. This program will address these developments and provide tips for managing privacy concerns in an era of fast-changing privacy laws.
Karl Wabst

Social Security Numbers Will Be Randomized | SmartCredit Blog - 0 views

  •  
    On June 25, 2011, the Social Security Administration (SSA) will began assigning random Social Security Numbers (SSN). The current numbering process had been in place since it was created in 1936.
Karl Wabst

Facebook Makes Security Changes as Privacy Controversy Swirls - Security from eWeek - 0 views

  •  
    "Facebook tightens security as it deals with the
    continuing fallout over changes to its privacy settings."

    ...Earlier on May 13, Facebook had a meeting where employees asked executives questions about privacy. Facebook officials would not comment on exactly what was said.

    "We have an open culture and it should come as no surprise that we're providing a forum for employees to ask questions on a topic that has received a lot of outside interest," a spokesperson said.

  •  
    Hey Zuck! Privacy & security are NOT the same thing. Misdirection is not the response FB users are seeking.
Karl Wabst

Hello, Internet, I'm on vacation. Please rob me! - The Globe and Mail - 0 views

  •  
    "Scott Fortnum had put in almost a full day of work at his Markham, Ont., office when he decided to "check in" on Foursquare, a location-based social network where users log the names and co-ordinates of the places they visit with a time stamp.

    The 44-year-old's check-in was marked with a small coral balloon on an embedded Google Map and instantly viewable by the 12 friends he lists on Foursquare - and millions of others.

    His check-in found its way onto pleaserobme.com, a recently launched website with a mischievous mandate: "listing all those empty homes out there."

    With March break approaching, many impending vacationers are installing automatic timers on their lights and putting their newspaper subscriptions on hold to deter burglars. Many are also posting on Twitter about when they're leaving and touting their week-long getaway to Jamaica on Facebook - unwittingly letting the online world know exactly when they're away.

    Mr. Fortnum's check-in appeared this way on Please Rob Me: @sfortnum left home and checked in 30 minutes ago: I'm at ALS Canada (3000 Steeles Ave. E. #200, DVP & Steeles, Toronto.) http://4sq.com/4MmX51

    Many Foursquare users such as Mr. Fortnum cross-post their check-ins to Twitter, where they are easy to find through the search function. With some simple coding, Please Rob Me's creators are able to collect those millions of public tweets on their site in real time, highlighting one of the many security concerns that springs from broadcasting one's whereabouts online.

    Frank Groeneveld, one of the three students from the Netherlands who designed Please Rob Me, says he co-created the site to give members of social networks a wake-up call."
  •  
    Finally a site that might make someone a profit!
Karl Wabst

From the CIO: Why You Didn't Get the CISO Job - 0 views

  •  
    "It was fascinating to read your thoughts about our recent conversation in CSO (see The Many Challenges of Finding Work as a CISO/CSO"). And when I say "fascinating," I mean in the sense of watching Nascar: a lot of predictable left turns and some really embarrassing, squirm-inducing shots of the fans.

    I do like you, I think you're a nice guy, and so I wanted to give you some feedback about the interview process and what you're going to need to change to be successful.

    I don't think you're going to enjoy reading this. But maybe some of those hours that you're spending maintaining that "vast database" of yours could be better spent understanding why we hired someone who understands they're an engineer."
  •  
    One of the most enlightening articles I have seen on the value of security to corporate America.
1 - 20 of 230 Next › Last »
Showing 20 items per page