Tags: data breaches
You may be aware of the uber techie bad boy hackers of Anonymous/Lulz/Anti-sec/Wikileaks/ScriptKiddies and the organized web mobs of the world. Did you know they have wreaked havoc to the degree that almost a billion records have been compromised? A recent study “gathered 3,765 publicly disclosed data breach incidents occurring in 33 countries during 2005-2010. The incidents included over 806.2 million known records being disclosed– averaging more than 388,000 records per day/15,000 records per hour every single day for the past six years.”
#1 Not all data is hacked. Exercise basic to advanced premise/physical security such as access control, security cameras and alarms.
#2 Limit the amount of data required from customers. If you don’t really need a Social Security number then don’t store it. If credit card information doesn’t need to be stored then don’t store it.
#3 Recognize that knowledge based authentication questions as password resets can bring down the house. Many of the answers can be found in social media sites.
#4 Laptops are one of the biggest data breach points. Laptop data should be encrypted. Laptops should never be left in a car overnight or left in a hotel room or office alone or on a coffee table in a café unattended. Laptop tracking software that locates and wipes data is essential.
#5 Train, train, train, train. Training on data security and what to do, and what not to do is priority number one. Clicking links in emails, downloading anything from the web or email, opening attachments in emails, have all been recent successful ways to infect a network.
ROBERT SICILIANO, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. His "tell it like it is" style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment's notice on breaking news.
- Credit Card Theft increasing for Banks and Retailers
2013 was the year of 740 million records involving data breaches. And that number may be erring quite on the conservative side, according to the Online Trust Alliance. The records come from a list on the Privacy Rights Clearinghouse Chronology Data Base. The list is that of publically disclosed breaches, including the alleged 110 million that struck
- 7 Laptop Security tips for the Traveler
Here are nine ways you can add a lot of security to your laptop when traveling. Bag it. Keep the laptop in a sturdy bag that’s specially designed for laptops. The sleeve should be well-padded and the bag TSA-compliant. The bag should be collapsible and expandable (depending on contents), and easy to wear near your body
- Identity Theft Expert Speaker; VA agrees to pay $20 million to veterans in 2006 data breach
Identity Theft Expert Speaker; Robert Siciliano www.IDTheftSecurity.com VA agrees to pay $20 million to veterans in 2006 data breach Government is paying up regarding a stolen laptop from 2 years ago. A laptop computer was stolen from the home of a Veterans Administration employee and had 26.5 million names addresses and social security numbers of veterans
- Eight security tips for travelers with laptop
These days, who doesn’t travel with their laptop? But commonality doesn’t make it inherently safe for your sensitive information that’s stored in the device. In fact, traveling with your laptop is inherently unsecure. Whether you’re traveling for business or to visit family this holiday season, here are some ways to protect your laptop and your personal
- 11 Tips to Hotel Safety and Security
Can you name 11 tips for hotel safety and security? How about just five? Have you ever walked down the hallway of a hotel and passed by rooms with doors left wide-open by cleaning staff? Ever thought of how easy it would be to enter and pretend the room is yours? Imagine what you could steal. This
Leave a Comment
You must be logged in to post a comment.