You may be aware of the uber techie bad boy hackers of Anonymous/Lulz/Anti-sec/Wikileaks/ScriptKiddies and the organized web mobs of the world. Did you know they have wreaked havoc to the degree that almost a billion records have been compromised? A recent study “gathered 3,765 publicly disclosed data breach incidents occurring in 33 countries during 2005-2010. The incidents included over 806.2 million known records being disclosed– averaging more than 388,000 records per day/15,000 records per hour every single day for the past six years.”
#1 Not all data is hacked. Exercise basic to advanced premise/physical security such as access control, security cameras and alarms.
#2 Limit the amount of data required from customers. If you don’t really need a Social Security number then don’t store it. If credit card information doesn’t need to be stored then don’t store it.
#3 Recognize that knowledge based authentication questions as password resets can bring down the house. Many of the answers can be found in social media sites.
#4 Laptops are one of the biggest data breach points. Laptop data should be encrypted. Laptops should never be left in a car overnight or left in a hotel room or office alone or on a coffee table in a café unattended. Laptop tracking software that locates and wipes data is essential.
#5 Train, train, train, train. Training on data security and what to do, and what not to do is priority number one. Clicking links in emails, downloading anything from the web or email, opening attachments in emails, have all been recent successful ways to infect a network.
Robert Siciliano personal and small business security specialist toADT Small Business Security discussingADT Pulse on Fox News. Disclosures
About the Author
ROBERT SICILIANO, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. His "tell it like it is" style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment's notice on breaking news.
- Identity Theft Expert Speaker; VA agrees to pay $20 million to veterans in 2006 data breach
Identity Theft Expert Speaker; Robert Siciliano www.IDTheftSecurity.com VA agrees to pay $20 million to veterans in 2006 data breach
Government is paying up regarding a stolen laptop from 2 years ago. A laptop computer was stolen from the home of a Veterans Administration employee and had 26.5 million names addresses and social security numbers of veterans
- Scammer Tricks Woman with Bait and Switch
As far back as I can remember I would often be approached in parking lots by someone in a van who was trying to sell me home stereo speakers. The speakers were always from a retailer’s loading dock or from trucks that had extra unaccounted inventory. And today was my lucky day. The ruse was
- Business Data Breaches Key in Rise of ID Theft
The 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier report released by Javelin Strategy & Research Data Breaches increasing and more damaging – “One likely contributing factor to the fraud increase was the 67 percent increase in the number of Americans impacted by data breaches compared to 2010. Javelin Strategy
- The $6.75 Million Dollar Laptop
Robert Siciliano Identity Theft Expert
Dan Yost Chief Technology Officer of MyLaptopGPS brought attention to the Ponemon Institute, with sponsorship from PGP, has released their “Fifth Annual U.S. Cost of Data Breach Study.” As usual, the report is a treasure trove of great data (just like most people’s laptops are).
The average cost per breached data record
- What are the risks of BYOD?
As companies cut costs, and employees desire more freedom of choice, they increasinglybring their own mobile devices to work. . The opportunity to eliminate the significant expenses associated with corporate mobile devices excites even the most staid CFO, and the IT guys are told to “make it work.” This development has come to be known
Leave a Comment
You must be logged in to post a comment.