Archive for August, 2014

hacker

Top 10 Worst Security Breaches in Q2

Hacker by mikael altemark 4.2.07 Did you know that 381 reported breaches and 10.8 million records have been exposed in the first six months of 2014? CSO Online posted this excellent summary of the worst security breaches that took place in just the second quarter of 2014.  The consistent rate of high profile breaches and the variety of organizations

Read More
mobile check

Mobile Banking Needs Secure Messaging

Deposit Checks with Your Phone by SimpleIllustrations 11.29.11 As banking has moved from online to mobile, tools like secure messaging are needed to combat the emergence of new threats. Mobile banking is thriving with over 100 million users in the U.S. alone. Consumers love the convenience

Read More
file cab

Nearly Half of Healthcare Breaches Are Caused By File Transfer

file cabinets by redjar 3.1.2000 The 2014 Verizon Data Breach Report found that 46 percent of all healthcare security incidents were related to file transfer i.e. lost USB drives, paper files or backup disks. The report cited here “examined more

Read More
old lock

Yahoo Email Encryption: Great Marketing Spin on Old Technology

Yahoo’s PGP is a new version of the same old lock and key. Yahoo recently followed Google in announcing email encryption capabilities for their free webmail, leveraging data privacy’s residency in the public spotlight. While this makes for a great headline the

Read More
imagine

Imagining Innovation in Email

Manhattan Central Park – Imagine Mosaic www.GlynLowe.com 8.25.12 When Gmail turned ten years old earlier this year, it made people pause and think “Wow, has it really been 10 years?” When Gmail first came on the scene, it was definitely slicker than the other options out there and did add

Read More
email security

Email Security is Still a Struggle

Email sign in a lock form by Dominic Jaar 11.28.07 Security officers are still struggling with email security according to Neil Thacker, information security and strategy officer EMEA for Websense. He spoke on the topic at Computing’s recent Enterprise Security and Risk Management Summit 2014. Thacker told the audience that “Bad people

Read More
Fingerprint

Secure Messaging Can Prove a Breach Did Not Occur

Fingerprint by CPOA 2.15.13 One of the challenging aspects of security is that even what constitutes a breach is debatable. For example, if an email with confidential information is sent to the wrong person and the email was recalled before the recipient could read it, is

Read More
Jacob_Schiff_in_a_boardroom

Strong Information Security is Good Branding

Caption: In 1918 it was highly unlikely that cyber security made it onto the agenda of any boardroom discussion. When recruiting a new chief executive to lead a major international retail chain you’d expect a board of directors to look for traits

Read More
Commodity

The Commoditization of Email Encryption

Commodity image by Simon Cunningham 12.31.13 It happened so fast, it’s almost hard to believe. Email encryption has become a commodity. The price for encryption has dipped below $2 per user and it might not be too long before we’re talking cents

Read More