Security of Your Information in the Cloud

December 21, 2010

I use many cloud services like Dropbox and Evernote but have been hesitant to put too much personal information on the cloud. I’ve always wondered how reliable the services are but more importantly, if I lose anyone else’s sensitive information on the cloud, would I be responsible for that or would Dropbox or Evernote in this case. Alex Williams recently wrote on the topic and I found it very relevant and interesting. While I agree with his comment that customers must determine any extra insurance that they may need to carry for information stored on a cloud, I’d be interested to hear his point of view on which insurance would respond first. If Dropbox were to lose a customer database, would they be responsible to notify those customers or would I?


Google Cyber Attacks traced to Chinese Schools

February 19, 2010

The recent attacks on google and other US companies that were traced to China have more specifically been traced to two Chinese schools, one that has ties to the Chinese Military. The same investigators who have traced the attacks to the schools also believe that the attacks may have started as early as April but were only recently detected. Although the Chinese government still denies they were involved in the attacks, it is becoming increasingly more difficult to believe their stance as more fingers continue to point to their involvement.

To read the entire article, click here.

Do you use the same password for all your accounts?

February 8, 2010

According to Trusteer, an online security firm, almost 3/4 people reuse their banking passwords on other, less secure sites. This can lead to cyber thiefs stealing your information from a less secure site and using it to crack into your bank account. So be careful and use different passwords!

To read the article, click here.

Does your company have a culture of privacy?

January 18, 2010

In a recent blog post written by the Ponemon Institute they discuss how to create a culture of privacy in your organization. Just as organizations who take employee safety seriously have less risk of an injury, companies who take data security seriously have less of a chance of suffering a breach. Put up reminders in the office to make sure all attachments are secure before sending them out, reminding people to change passwords and set passwords on laptops and mobile devices, or hold an annual seminar to keep employees aware of relevant issues. These are just a few of the many things you can do to create a culture of privacy in your organization.

To read the complete post, click here.

Small Banks, Watch out for Cybercrooks!

December 31, 2009

There was a great article in the USA Today recently about cyber criminals attacking small to mid sized banks and using trojans to hack into the system. Once in the system, the hackers were transferring money via wire or ACH to outside bank accounts. One of the most interesting things in the article talks about personal vs. business bank accounts. Personal accounts are insured by the FDIC so if you’re account is hacked, you should be able to get your money back but business accounts are not. The article suggests that any small business owner who has a bank account make sure it is a personal checking account so your deposits will be insured.

To read the entire article, click here.

Records Management and Privacy Tips

September 8, 2009

There was a great article in SC Magazine recently about records management and privacy. They listed some areas and tips to securing records that include:
Maintain a well kept inventory of your records
Set a retention period for records
Properly store your records
Encrypt your records during transmission
Properly dispose of your records

To read the entire article, click here.

Russia Steals US Information to Attack Georgia

August 17, 2009

It was recently released that the Russians used technology and personal information from the United States to attack Georgia last year before they invaded. They used the cyber attack to disrupt communication and disabled 20 websites including the president and defense ministers websites and the National Bank of Georgia’s website. They used social networking sites like Twitter and Facebook to steal most of the data.

To read the entire article, click here.