Why Your Business Requires Security

The States and Federal Identity Theft and Privacy Protection Laws now require businesses, agencies and organizations of all sizes to protect all personal information they store, and report to all their customers whenever a breach occurs. The financial ramifications after having a data breach can be very substantial to both present and future business. In some many cases a company never does recover from a breach and is forced to close down. Currently, the average cost on a company is $3.7M per incident.

Archive for Building Security

Dec
05

SecurID Tokens Are Being Hacked

Posted by: | Comments Comments Off on SecurID Tokens Are Being Hacked

Are Your Secure ID Tokens Really Secure From Being Hacked?

One of the leading supplier of one time passwords (OTP) tokens is RSA (an EMC company) has recently been in the news because Lockheed Martin and L-3 Communications had their SecurID tokens being hacked. RSA said that attackers had accessed code related to its SecurID two-factor authentication technology. Read More→

Comments Comments Off on SecurID Tokens Are Being Hacked
Oct
05

“So many paper shredders, but what’s right for me?”

Posted by: | Comments Comments Off on “So many paper shredders, but what’s right for me?”

FACTA requires secure disposal of documents that contains a customer’s or employee’s personal information. Shredding is one of the easiest ways to start protecting your company from a violation. With so many different shredders and options on the market, Nancy Heaton of Fellowes will help explain how to match the shredder to your business environment.

Click here to listen to the interview with Nancy Heaton: Fellows

Comments Comments Off on “So many paper shredders, but what’s right for me?”
May
01

How Thieves Physically Steal Your Data!

Posted by: | Comments Comments Off on How Thieves Physically Steal Your Data!

Basically, the theft of sensitive information from companies can happen in two ways: physical data breaches or online breaches of security. Physical identity theft refers to cases where the identity thief needs to get in close to their targets or to the information they are trying to obtain. These sorts of identity theft efforts include dumpster diving to search for documents which contain information such as account numbers, social security card or credit card numbers, addresses and like. Basically, any information which contains personally identifying information on a customer, vendor or employee is of use to identity thieves. Mail may be stolen or thieves may pose as company representatives over the phone in an effort to extract information from unwary employees.

Here are top fifteen ways in which corporate information is stolen by physical means: Read More→

Categories : Building Security
Comments Comments Off on How Thieves Physically Steal Your Data!
Apr
17

Employees Cause Data Security Breaches – Not Malware

Posted by: | Comments Comments Off on Employees Cause Data Security Breaches – Not Malware

When business owners look around their office and see how sensitive documents are handled it is no wonder that the weakest security link is the employee. But it is not always the employee’s fault since they have never been trained or given the security tools to protect data.

A Symantec report says that most breaches at small to midsize businesses are caused by people, not malware. Click here to read the entire article.

Look at all the four vulnerability point: Building – Employee – PC – Network and start implementing training, policies and solutions that are inexpensive and work.

Comments Comments Off on Employees Cause Data Security Breaches – Not Malware
Mar
28

Security Talk #6 – Importance of Paper Shredder Selection

Posted by: | Comments Comments Off on Security Talk #6 – Importance of Paper Shredder Selection

FACTA requires secure disposal of documents that contains a customer’s or employee’s personal information. Shredding is one of the easiest ways to start protecting your company from a violation. With so many different shredders and options on the market, Nancy Heaton of Fellowes will help explain how to match the shredder to your business environment.

valid-rss

Comments Comments Off on Security Talk #6 – Importance of Paper Shredder Selection
FLEXCAP
SiteLock