Blog Posts Tagged with "Data Loss"

959779642e6e758563e80b5d83150a9f

Celebrity Privacy Breaches and High School Physics

February 01, 2013 Added by:Danny Lieberman

In our previous post on patient privacy, we noted that patient data loss is a lot like planes disappearing in the Bermuda Triangle – no one really knows where the planes disappeared to, since the people on the planes never return to tell the story...

Comments  (0)

959779642e6e758563e80b5d83150a9f

The #1 Bermuda Triangle of Patient Privacy – debunking patient data loss

January 05, 2013 Added by:Danny Lieberman

Patient data loss is a lot like planes disappearing in the Bermuda Triangle – no one really knows where the planes disappeared to, since the people on the planes never came back to tell the story. The same way we talk about patient data loss and never really consider how you can “lose” patient data and whether it can be “returned”.

Comments  (2)

94c7ac665bbf77879483b04272744424

Concerted Chinese Government Attacks or Just Another Day?

October 01, 2012 Added by:Marc Quibell

Front page news headlines today: "Chinese Hackers Breach White House!" For a split second there I was almost concerned; and then after reading I thought to myself...blah another false alarm. What did I expect?

Comments  (2)

Bd07d58f0d31d48d3764821d109bf165

When Log Files Attack: IEEE Data Leak

September 28, 2012 Added by:Tripwire Inc

The fact that usernames and passwords were being logged to a plaintext file itself is problematic, even if the passwords are being hashed when stored in a database, if such data is logged in plain text it defeats the entire purpose...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

State-Sponsored Attacks or Not? That's the Question...

September 18, 2012 Added by:Pierluigi Paganini

Despite the use of cyber weapons and the damage caused by offensive operations being major concerns for intelligence agencies, clues are frequently discovered about attacks designed to steal sensitive information and intellectual property. Who is behind these cyber attacks?

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Rapid 7 Analysis of Data Breach Incidents

September 11, 2012 Added by:Pierluigi Paganini

Excluding attacks by foreign governments and cyber criminals that exploit 0-days, with best practices and the adoption of compliance at the current standard, in matters of security it is possible to avoid data breach incidents, or at least reduce the amount of exposed information...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

As BYOD Trend Grows So Do Malware Attacks

September 06, 2012 Added by:Bill Gerneglia

The report found that the majority of employee’s devices did not have any form of security software loaded nor were company materials protected. The new report provides detailed assessments of the mobile security threat and the growing market for security solutions...

Comments  (0)

8e6e3972318ff74b194801340248199e

How I Learned about File Encryption the Hard Way

September 06, 2012 Added by:Scott Thomas

Learn about file versus whole disk encryption, as well as where keys are stored. Also learn to move the keys if you're going to wipe a drive. If I can offer anything to anyone about file encryption it would be to completely understand how it works before you play with live data...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Inevitability of a Data Breach

September 05, 2012 Added by:Rafal Los

Only after many years of beating the drum that non-security professionals are waking up to the fact that security cannot be an after-thought in development. It'll take another five years before business executives are comfortable with the notion that they will be breached...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: Shamoon - DistTrack Malware

August 30, 2012 Added by:Infosec Island Admin

W32.DistTrack, also known as “Shamoon,” is an information-stealing malware that also includes a destructive module. Shamoon renders infected systems useless by overwriting the Master Boot Record (MBR), the partition tables, and most of the files with random data. Once overwritten, the data are not recoverable...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Cyber Attacks Increasingly Target Small Companies

August 26, 2012 Added by:Bill Gerneglia

Your company may not be the primary target, an attacker may use your organization as a stepping-stone to attack another. Don't be the weakest link in the supply chain. Information is power, the attackers know this, and successful attacks can result in significant financial loss...

Comments  (4)

F29746c6cb299c1755e4087e6126a816

The Data Compromise Evolutionary Clock Is Ticking

August 22, 2012 Added by:Kelly Colgan

The digitization of medical records may make folks queasy, but it is also efficient, offering an opportunity to save both money and lives. It is in fact inevitable. Unfortunately, so are data breaches and the identity compromises that follow. We need to be deadly serious because lives are at literally at stake...

Comments  (0)

C67c179cd59e50f867e06086f5b2d21f

The Unforeseen Risks of the Cloud

August 21, 2012 Added by:Barrie Hadfield

Consumer-based cloud platforms focus exclusively on usability and do little, if anything, to prevent the improper distribution of sensitive files and information across the firewall. the opportunity for corporate documents to fall into the wrong hands has become essentially limitless...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Network Exposure and Healthcare Privacy Breaches

August 20, 2012 Added by:Danny Lieberman

EHR interconnected with HIE systems have a big threat surface, because of big, very complex software systems with a large number of attacker entry points. Healthcare system vulnerabilities are compounded since everyone is using the same technology from Microsoft and following the same HIPAA compliance checklists...

Comments  (0)

9f19bdb2d175ba86949c352b0cb85572

Infographic: The Social Media Side of Incident Response...

August 13, 2012 Added by:Neira Jones

It seems that my previous post on the social media side of incident response attracted some attention and I thank everyone for their feedback. This prompted me to explore the brave new world of infographics... So here we go, my first foray into what is for me uncharted territory...

Comments  (0)

37d5f81e2277051bc17116221040d51c

The Risks from a Lost or Stolen Mobile Device

August 13, 2012 Added by:Robert Siciliano

Mobile devices are on the move, meaning they can more easily be lost or stolen and their screens and keyboards are easier targets for “over the shoulder” browsing. When we lose our phones, we think about the pain and cost of replacing the device. But that’s just the tip of the iceberg...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked