Why Your Business Requires Security

The States and Federal Identity Theft and Privacy Protection Laws now require businesses, agencies and organizations of all sizes to protect all personal information they store, and report to all their customers whenever a breach occurs. The financial ramifications after having a data breach can be very substantial to both present and future business. In some many cases a company never does recover from a breach and is forced to close down. Currently, the average cost on a company is $3.7M per incident.

Archive for Business Security

Sep
09

IT Security Rules Facilitate Data Breaches

Posted by: | Comments Comments Off on IT Security Rules Facilitate Data Breaches

We all have been told by Corporate IT that we must have complex passwords, they must have a minimum of eight characters, don’t use the same password for other sites, and change them every 60- to 90-days. While these may seem like great practices, these rules could facilitate a security breach. Read More→

Comments Comments Off on IT Security Rules Facilitate Data Breaches
Jul
22

Found USB Drive in Parking Lot

Posted by: | Comments Comments Off on Found USB Drive in Parking Lot

I was recently told of a story of an incident that happened a few weeks ago. However, this is not the first time I have heard the tale. An employee is walking through the parking lot and finds a USB stick on the ground. Fearful that it might be important information of a colleague, the employee picks up the stick and takes it back to his office. To determine who is the owner, the employee inserts the drive into his computer and opens up the folders thinking that its contents will identify the owner.

WAM – the entire company’s network is infected with a new virus that the anti-virus program did not recognize.

The dropping of virus seeds in the way of USB drives is a very common attack. Drives are left in corporate lobbies, doctor’s offices, parking lots, restaurants, any place where people gather. The thieves are counting on Good Samaritans to help their follow man or woman.

Employers need to inform their employees of the following procedures:

1. If they find a USB drive never have them put it into their computer

2. They should give the drive to IT to determine what they want to do with it.

3. If there is no IT dept either drob the drive into the garbage or first smash it with a hammer before dropping it into the garbage.

4. Don’t worry that someone will loose important data. They probably have backup and if they don’t they soon will; and if there was confidential data on the device you just saved the company’s customers from a data breach.

Comments Comments Off on Found USB Drive in Parking Lot
Jul
22

Medical ID theft is nothing to sneeze at

Posted by: | Comments Comments Off on Medical ID theft is nothing to sneeze at

Below is a report from the Smart Card Alliance on Medical Identity Theft. While the info is staggering the walk away points for me is the migration to PHRs, EHRs and HIEs. Security has to start at the very beginning and that is where a secure token and password manager combination work well together.

Medical Identity Theft in Healthcare

Publication Date: March 2010

While identity theft is a global issue that garners much media attention, most do not realize that medical identity theft is a serious and growing threat. Many authorities consider medical identity theft one of the fastest growing crimes in America. With the Read More→

Comments Comments Off on Medical ID theft is nothing to sneeze at
May
18

How Secure are the Secure Email Programs?

Posted by: | Comments Comments Off on How Secure are the Secure Email Programs?

HITECH is the latest requirement to secure HIPAA. And while there are many parts to these regulations, the latest question I have been getting is finding a good secure email and encryption document attachments application. Well, it turned out to be like asking me for a good flavor of ice cream. It really depends on your taste. There are many different ways companies have implemented security.

In the world of secure emails the choice may be based around your preferred communications channel (smart phone, PC, netbook, etc), what is convenient to you, are you more of a cloud person or a PC based email app user, price per user, number of emails that can be sent, and so forth. But the number one perspective you have to have in evaluating any of these different products is how convenient is it to your recipients. I am a firm believer that if you make security cumbersome, then users will always find ways to circumvent security for their own convenience. However, you can’t make something so convenient that security is thrown out the window. It’s a balancing act. Read More→

Comments Comments Off on How Secure are the Secure Email Programs?
May
17

Email marketing is a waste of time and money

Posted by: | Comments Comments Off on Email marketing is a waste of time and money

Not for reason you might think. Internet security or the lack there of, has made users suspicious and distrustful to all unsolicited emails. Let’s first take the argument from the personal perspective. We all have been hit with spam in our email accounts. We may have also experiences are own email address being hijacked by email spoofers.  All with the intent to get the recipient to click a link or open a file to start the process of identity theft. Read More→

Categories : Business Security
Comments Comments Off on Email marketing is a waste of time and money
FLEXCAP
SiteLock