7 Sources of Data Breaches You’ll Never Hear About: Your Phone

7 Sources of Data Breaches You’ll Never Hear About: Your Phone

This post is the first in a series about preventable data breaches. Most Americans have received a letter, telling them that their personal information has been breached. But there are many breaches you’ll never hear about, and many of them are right under your nose. The first source we’ll explore is Your Phone and Personal Computing Device. … [Read more...]

Into the Breach – Audio Series – Chapter 11 (Outsource with Security and Success)

Into the Breach – Audio Series – Chapter 11 (Outsource with Security and Success)

Welcome to the continuation of the Into the Breach: Protect Your Business by Managing People, Information and Risk audio series. (Click this link) to learn more about this how this book solves today’s challenges and pick up a complete copy. This series, underwritten by Configuresoft, now part of EMC, is the full and unabridged audio version of Into the Breach, written by Michael Santarcangelo and read by the author. What you’ll find in this episode (Chapter 11) Outsourcing makes sense for a lot of organizations and continues to gain in popularity. Does this drive to outsource and partner actually increase security and protection of information? By leveraging the strategy and concepts shared in Into the Breach, learn how to build a firm foundation for success … [Read more...]

Into the Breach Audio Book Chapter 10: Reducing the Cost of Compliance

Welcome to the continuation of the Into the Breach: Protect Your Business by Managing People, Information and Risk audio series. (Click this link) to learn more about this how this book solves today's challenges and pick up a complete copy. This series, underwritten by Configuresoft, now part of EMC, is the full and unabridged audio version of Into the Breach, written by Michael Santarcangelo and read by the author. In this episode (Chapter 10) Compliance is not a commodity that can be purchased. And demonstrating compliance at a point in time does not mean information is being protected properly. There is a growing chorus of practitioners that suggest compliance is not security; however, proper security can and often does lead to effective compliance. The key … [Read more...]

Into the Breach – Audio Series – Chapter 6 (Implementing The Strategy to Protect Information)

Into the Breach – Audio Series – Chapter 6 (Implementing The Strategy to Protect Information)

Welcome to the continuation of the Into the Breach: Protect Your Business by Managing People, Information and Risk audio series. (Click this link) to learn more about this how this book solves today’s challenges and pick up a complete copy. This series, underwritten by Configuresoft, now part of EMC, is the full and unabridged audio version of Into the Breach, written by Michael Santarcangelo and read by the author. Join us for a new chapter released on the first Tuesday of each month (there are 13 chapters total). What you’ll find in this episode (Chapter 6) Chapter Six is where Michael explains how to customize and implement the Strategy to Protect Information. The information he shares is designed for immediate results by harnessing the power of people. By … [Read more...]

Into the Breach – Audio Series – Chapter 5 (The Strategy to Protect Information)

Into the Breach – Audio Series – Chapter 5 (The Strategy to Protect Information)

Welcome to the continuation of the Into the Breach: Protect Your Business by Managing People, Information and Risk audio series. (Click this link) to learn more about this how this book solves today’s challenges and pick up a complete copy. This series, underwritten by Configuresoft, now part of EMC, is the full and unabridged audio version of Into the Breach, written by Michael Santarcangelo and read by the author. Join us for a new chapter released on the first Tuesday of each month (there are 13 chapters total). What you’ll find in episode 6, Into the Breach: Chapter 5 (The Strategy to Protect Information) Chapter 5 is the introduction to Part II of Into the Breach -- where the focus shifts to looking at what needs to be done. I outline a powerful, yet … [Read more...]

Securing the Toughest Times

Securing the Toughest Times

by Ron Woerner Whether you call it lay-offs, downsizing, rightsizing, redundancies, a reduction in force, or whatever, a reduction in staff stinks.  Downturns in the economy often translate to a reduced volume of business, resulting in a correlated reduction in staff.  One of the hardest jobs in Security is ensuring that those who are asked to leave no longer have access to the organization's resources.  This is especially hard when you know those affected.  However it’s critical that this tough job be done. The last thing you want or need is for an ex-employee to perform a malicious act as part of their departure.  The recent case with the Fannie Mae consultant is a great example of how a malcontent could potentially cause your organization grave damage.  … [Read more...]