Data Breaches

Data Security: People Don't Care, Enterprises Should
Data Security: People Don't Care, Enterprises Should

In our recently released 2013 Mobile Enterprise Risk Survey, we saw shocking insight on how enterprise workers believe “security is not my responsibility,” with most employees valuing corporate data on their phones at less than $500. Our research shows that 25% of employees believe there should be no punishment if they leak corporate data since it’s “not their responsibility,” and our findings show that most people who do leak data are...

READ MORE
The Impact of New Healthcare Legislature on Data Security
The Impact of New Healthcare Legislature on Data Security

The deadline to enrol for coverage in 2014 under the new Affordable Care Act, (“Obamacare”) is March 31, 2014. More than 6 million Americans have signed up for coverage through the new Health Insurance Marketplaces since October 1st. Also on the horizon is the American Recovery and Reinvestment Act of 2009, which requires that healthcare providers switch over to electronic medical records (ePHI) by 2015 on penalty of lost...

READ MORE
Work-Only Devices are Going Extinct
Work-Only Devices are Going Extinct

Work-only smartphones are becoming a thing of the past (if they aren’t already). According to research from Forrester, 55% of US Information Workers would prefer to use one single smartphone for work and personal use (as opposed to just 32% who would prefer separate smartphones). Not only do workers want a single smartphone, it’s clear that those who still have work-“only” phones are using them for personal use. The Absolute...

READ MORE
Australia Privacy Principles Come Into Effect March 12 – Are You Ready?
Australia Privacy Principles Come Into Effect March 12 – Are You Ready?

Australia is unveiling its new privacy law changes on March 12th and many businesses have been rushing to meet this deadline. The Australian Privacy Principles (APP) includes a set of 13 privacy principles that regulate the handling of personal information by Australian and Norfolk Island Government agencies and some private sector organizations, replacing previous Privacy Principles that applied to each sector individually. Understanding the APP The APPs cover the...

READ MORE
Information Security Quantified Risk
Information Security Quantified Risk

In a previous blog post, Information Security Maturity, I mentioned that organizations with mature information security management programs have policies that govern the enterprise, systems, and issues. In implementation of policies, it is common to attempt to quantify risks to support priorities of actions and costs, such as remediation or replacement efforts, as organizations need to manage their level of risk and exposure. Rafal Los (AKA Wh1t3Rabbit) recently blogged...

READ MORE