Blog Posts Tagged with "Data Loss"

959779642e6e758563e80b5d83150a9f

Why Does Data Leak?

August 06, 2012 Added by:Danny Lieberman

Data is leaked or stolen because it has value. The financial impact of a breach is directly proportional to the value of the asset. The key attack vector for an event is people - often business partners working with inside employees. People handle electronic data and make mistakes or do not follow policies...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Court Dismissed Another Data Breach Suit

August 06, 2012 Added by:David Navetta

The Holmes decision further underscores difficulties in securing any recovery on a data breach lawsuit absent actual identity theft. However, the lengthy history of this case — dating back to 2008 including a challenge to a Court approved settlement — highlights that such cases are protracted and costly to defend...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Army Translator Re-Sentenced for Possession of Classified Docs

August 06, 2012 Added by:Headlines

The defendant took classified documents from the U.S. Army without authorization. While assigned to an intelligence group in the 82nd Airborne Division of the U.S. Army at Al Taqqadam Air Base, he downloaded a classified electronic document and took hard copies of several other classified documents...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Find Out Which Companies Dropped the Security Baton

August 05, 2012 Added by:Kelly Colgan

Find out which organizations experienced the thrill of a well-designed privacy plan and which ones endured the agony of an easily prevented data breach. The goal is simple. We want organizations to get smarter about data security to better protect consumers’ personally identifiable information...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Losing Trust: Canadian Data Breach Spotlights Human Error

July 27, 2012 Added by:Kelly Colgan

It’s not just about protecting ourselves from identity theft or fraud like when our account number or government-issued ID numbers are exposed. It’s what I like to call privacy for the sake of privacy. Just knowing that someone could be looking at our personal histories doesn’t sit well with the public...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Latest Data Breach Notification Bill Won’t Go Far

July 23, 2012 Added by:Kelly Colgan

When comparing the bill to existing state laws on the subject, the lack of focus on consumer protection and an emphasis on making it business-friendly become evident. It becomes evident not by looking at what the bill contains, but by looking at what is purposely missing...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

One in Ten Small Businesses Experienced a Data Hack

July 20, 2012 Added by:Headlines

"While the media is reporting a growing number of high profile data breaches, some small businesses may also be a popular target for hackers because their systems are usually easier to get into and the breach may not be found out for a good few weeks...”

Comments  (0)

9f19bdb2d175ba86949c352b0cb85572

On Failing Gracefully...

July 18, 2012 Added by:Neira Jones

You know the feeling: You think you have it all under control, you think you've engaged with the right people, you have buy in from those who matter, the right culture is in place, you're not struggling for investment and bang! You get hacked. Overwhelming sense of failure ensues. Where did it all go wrong?

Comments  (0)

02a6d0efd54c7388e26f125d8df83671

Notifying Customers About a Data Breach: Five Rules

July 17, 2012 Added by:Megan Berry

Legal fees, clean-up costs, lost business and damage to an organization’s reputation: consequences of a business being hit with a data breach. Cost can be significant, which is why it is critical to properly respond after a data breach...

Comments  (0)

94c7ac665bbf77879483b04272744424

Yahoo Voices Accounts Exposed and Available to the General Public

July 13, 2012 Added by:Marc Quibell

If Yahoo took "security very seriously" this probably may not have happened. This is obviously a fail in their IT Security practices, on many accounts, beginning with the SQL Injection attack used to compromise the server - yes, it only took one server to compromise for this to occur...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Selling Your Old Smartphone? Not Smart...

July 12, 2012 Added by:Robert Siciliano

I purchased a bunch of used devices off of Craigslist and eBay to see if I could find data on the devices. I found a startling amount of personal data including photos, phone numbers, addresses, emails, text messages and passwords. Even if you wipe and reformat a hard drive, you may still miss something...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Lack of Basic Security Practices Results in $1.7 Million Sanction

July 02, 2012 Added by:Rebecca Herold

“This is OCR’s first HIPAA action against a state agency and we expect organizations to comply with their obligations under these rules regardless of whether they are private or public entities.” Bottom line for all organizations of all sizes: It is wise to learn from the pain of others...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ZOMG: LinkedIn was Hacked and our Passwords Were Leaked

June 10, 2012 Added by:Infosec Island Admin

LinkedIn and other companies like Sony have shown time and again, they DON’T CARE about YOUR data. Always remember this people. So, you want an account on these places, then you best make a throw away password and limit your data on the sites that host it. Otherwise, your data will be up for the taking...

Comments  (1)

9f19bdb2d175ba86949c352b0cb85572

Nine Tips for Social Media Crisis Response

June 07, 2012 Added by:Neira Jones

Not impressed with LinkedIn's social media crisis response? Whilst the draft NIST report SP 800-61 gives really good guidelines on fully and effectively communicating important information to the public, there is some mileage to be had by exploring the use of social media when tackling incident response...

Comments  (0)

B9d9352326e5421a02e698a51d10ad2c

On the Recent Blizzard and Diablo 3 Account Compromises

May 29, 2012 Added by:Beau Woods

Gamers have gotten more savvy about giving away information which would allow someone else to access their account. But the attackers have adapted as well and use other ways of getting that information than by sending fake emails. Here are some of the more creative and sophisticated ways the thieves operate...

Comments  (2)

B64e021126c832bb29ec9fa988155eaf

Did Iran Recover Encrypted Data from Downed Stealth Drone?

May 02, 2012 Added by:Dan Dieterle

Iranian officials recently released claims that they have finished their reverse engineering of the downed US stealth drone and will begin to make a copy. The Iranians released information they say was encrypted flight and maintenance data from internal databases...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »