An employee with a private contractor for Colorado Medicaid was fired after sending an email to a personal account that contained sensitive information on almost 2,000 people.
Continue reading “Employee sends info on 2,000 to personal email address, gets fired”
New Ideas for Mitigating Insider Threat
Presidential Panel Suggests Series of Steps
Continue reading “New Ideas for Mitigating Insider Threat”
Privacy lenses pointed at Snapchat for making phone number searches too easy
Snapchat is a hip and happening mobile app, and you’ve probably heard of it, though not necessarily in flattering terms if you are interested in security.
Continue reading “Privacy lenses pointed at Snapchat for making phone number searches too easy”
Top 5 ATM Scams
With the new year around the corner, we decided to get into the spirit of things and come up with our Top 5 List. Here goes our Top 5 ATM Scams List.
Continue reading “Top 5 ATM Scams”
Protect against Identity Theft
Identity theft is, well, theft of your identity. Protect against it by safeguarding your identity. Thank you. The End.
Now, did that even qualify as a blog? It did say things that were correct, but made no sense to anyone. So, yes, it qualifies.
Continue reading “Protect against Identity Theft”
Some Critical Success Factors for a Business Continuity Initiative
Business continuity initiatives should be able to meet management and customer expectations in case of a disaster. Here are some pointers to help you towards that goal:
Continue reading “Some Critical Success Factors for a Business Continuity Initiative”
Passwords are passe?
We are all used to passwords as the de-facto authentication..recent news is suggesting its time may be up Continue reading “Passwords are passe?”
KPMG red-faced after being found with data leak
Sensitive data has been found on KPMG’s website soon after the consultancy released a report revealing blue chip companies doing the same.
Security researcher Robin Wood found 400 email addresses, 164 users and 112 PC names along with printers, software versions and “quite a lot of internal directories” on the US KPMG site.
via https://news.hitb.org/content/kpmg-red-faced-after-being-found-data-leak
How To Build Your Own CSI Forensics Lab

If you’ve been waiting for the right handbook to come along and tell you how to build your own forensic laboratory, keep waiting. The National Institute of Standards Technology (NIST)’s new edition of the “Forensic Science Laboratories: Handbook for Facility …![]()
via https://feeds.wired.com/c/35185/f/661467/s/2f057b2a/l/0L0Swired0N0Cthreatlevel0C20A130C0A70Cnist0C/story01.htm
Hacking Google account through Locked Android Devices
via https://thehackernews.com/2013/07/hacking-google-account-through-locked.html






