RSS

Category: Uncategorized

No Questionable Calls Here: The March Madness Meets Higher Education Data Breach “Brackets” Are Back!Team Shatter Exclusive

Posted March 18, 2013 by TeamSHATTER Admin in Data Breach, Database Security, Education, Team Shatter Exclusive, Uncategorized with 2 comments
march madness

March Madness is here! Yesterday, the NCAA Selection Committee selected 68 teams to participate in this year’s NCAA Division I Men’s Basketball Championship.  While fans across the country are sneaking out of the office to watch games, breaking out the ol’ college sweatshirts, and betting Vegas-style, we are joining the fun for the Third Annual Higher Education Data Breach Madness “Brackets.” Just like in previous years, the data breach madness “bracket” is determined solely by the number of reported breaches…

Click for complete article >>

Data Breach At B.C. Institute Of Technology, Unauthorized User Accessed Personal Information

Posted July 5, 2012 by TeamSHATTER Admin in Data Breach, Database Security, Education, Uncategorized with 0 comments
keys

B.C. Institute of Technology have discovered a security breach in which an unauthorized person accessed a computer server containing personal information of patients at the student health clinic on the Burnaby campus.  The breach was found during a recent scheduled security audit by BCIT’s information technology services department.  The records on the server date from October, 2005 to June 11, 2012. They include information collected and used for billing purposes at the clinic—name, date of birth, Medical Services Plan (MSP)…

Click for complete article >>

Guidelines Bill Is Introduced For Data Security Breaches

Posted June 25, 2012 by Tim Whitman in Breach Notification Laws, Data Breach, Database Security, Uncategorized with 0 comments
us capital

Sen. Pat Toomey (R-Pa.) introduced a bill on behalf of himself and four other Republican senators setting national standards for how companies inform individuals of a breach of security related to personal information. Toomey, alongside Sens. Olympia Snowe (Maine), Jim DeMint (S.C.), Roy Blunt (Mo.) and Dean Heller (Nev.), introduced the Data Security and Breach Notification Act of 2012 (S.3333) on Thursday. Click for complete article >>

Click for complete article >>

Utah Governor Fires Tech Director, Brings In Cyber Security Czar

new management

Gov. Gary Herbert apologized to the 780,000 victims of the health data security breach on Tuesday. To restore the public’s trust, he announced Tuesday that he fired Department of Technology Services director Stephen Fletcher and hired an ombudsman to shepherd victims through the process of protecting their identities and credit. “The people of Utah rightly believe that the government will protect them, their families, and their personal data. When they interface with us that is in fact our charge,” Herbert…

Click for complete article >>

UK Big Business Hit Hard By Cybercrime

Posted April 26, 2012 by Tim Whitman in Breach Costs, Data Breach, Database Security, Uncategorized with 0 comments
UK Flag

Hacking attacks against Blighty’s top firms hit a record high according to figures for 2011. On average, each large organisation suffered 54 significant digital assaults in that 12-month period, twice the level in 2010, while 15 per cent – one in seven – had their networks successfully penetrated by unauthorised parties. The average cost of a major security breach at a big biz last year was £110k to £250k ($177k to $403k), a figure that drops to £15k to £30k…

Click for complete article >>

Why Optimism Can Be Detrimental to Security

Posted March 23, 2012 by Tim Whitman in Best Practices, Data Breach, Database Security, Uncategorized with 0 comments
Happy & Sad

Why do executives make the wrong security decisions? Generally, bad security decisions are made for the same reasons that other bad decisions get made: inability to predict the future, failure to foresee all the consequences of the decision, and a reliance on someone else who doesn’t live up to their end of the deal. Security is particularly problematic, because we’re often dealing with newer technology, which is not as well-tested, and is consequently less likely to live up to its…

Click for complete article >>

Small Businesses Are More Vulnerable To Attacks

Posted March 22, 2012 by Tim Whitman in Data Breach, Database Security, Uncategorized with 0 comments
small business

If you run a small business, and think that none of your data was of interest to a hacker, consider this: what if a hacker could take stolen bank account or credit card information from your computer and package it with the same information from a hundred or a thousand other small businesses? Would it be worth something then? “SMBs don’t know how defenseless they’ve become, especially to automated and industrialized attack methodologies by organized crime,” Christopher Porter tells PCWorld….

Click for complete article >>

Importance For Healthcare Security Pros To “Speak” Finance

Healthcare

As the number of healthcare data breaches continues to snowball, executives put in charge of safeguarding protected health information (PHI) can’t keep up with the risks inherent with increased deployment of electronic health records (EHR) without enough financial backing to get the job done. And the only way that these PHI protectors can squeeze that juice from the C-suite is if they make themselves fluent in the language of financial justification, say authors of a new report out this week…

Click for complete article >>

Understanding And Selecting A Database Security Platform: Defining DSP

Posted February 7, 2012 by Tim Whitman in Best Practices, Database Security, General Business, Uncategorized with 0 comments
DAM To DSP

From the folks at analyst firm Securosis comes the next blog post in its “Understanding and Selecting a Database Security Platform” series.  Adrian Lane writes: As I stated in the intro, Database Security Platform (DSP, to save us writing time and piss off the anti-acronym crowd) differs from DAM in a couple ways. Let’s jump right in with a definition of DSP, and then highlight the critical differences between DAM and DSP. Click here for full article >>

Click for complete article >>

Senator Richard Blumenthal Introduces Online Security Bill

Posted September 14, 2011 by TeamSHATTER Admin in Uncategorized with 0 comments
Personal Data Protection and Breach Accountability Act of 2011

Senator Richard Blumenthal, Democrat of Connecticut, introduced a new bill Thursday that aims to protect citizens’ personal information from online data breaches. The bill would also punish companies that are careless with customers’ information. “The goal of the proposed law is essentially to hold accountable the companies and entities that store personal information and personal data and to deter data breaches,” Senator Blumenthal said in a phone interview. ”While looking at past data breaches, I’ve been struck with how many…

Click for complete article >>
Powered by