Domestic violence is not something that gets discussed much in information security circles, but there are few people that need advice on assuring their online safety more urgently than victims of stalking and domestic abuse. What can people do to protect themselves when there is a known and persistent threat?
This is a quick reminder that the September 23 deadline for compliance with the new HIPAA regulations is rapidly approaching. Organizations that handle protected health information (PHI) need to be sure they are up to speed on the changes and ready to withstand scrutiny. In general, you will need new NPPs and BAAs (Notices of
An infographic of recent healthcare IT security statistics paints a striking picture of much security work yet to be done, even as new medical privacy regulations go into effect.
Is your company ready for September 23, 2013, the deadline for compliance with HIPAA 2.0? The revised omnibus privacy and security regulations incorporating HITECH expose a lot more companies to possible fines.
The Xbox One Kinect microphone – one of the hi-tech new features of Microsoft’s new Xbox One console – has raised security concerns since it “listens” to users even when the console is turned off.
Britain’s hi-tech government intelligence agency GCHQ should know better than to send passwords in plain text via email – but has been doing so due to “legacy systems”, it admitted in a statement this week.
A prototype multi-cursor system designed to improve the security of on screen password entry has been posted onto DigInfo, the Tokyo based news site that promotes cutting edge technology from Japan.
Results from an eight country Accenture survey shows that US doctors surveyed have mixed feelings about electronic patient records (EPR). While some 82 percent want patients to update their own records, only a third (31 percent) believe they should have full access.
According to the PwC Top Health industry issues of 2013 report, healthcare managers and consumers are increasingly concerned about the rise of healthcare workers using their own devices within hospitals and other healthcare centers.
A French-Moroccan national was jailed by a Dublin court after being found guilty of hacking into the business accounts of an online betting company, according to the Irish Independent.
We tend to replace our computers more often these days but how do you ensure that you don’t give away your data when you pass on that old desktop or laptop? Here are our top tips for safer computer disposal. Back up your data Before you do anything with your existing PC or laptop, ensure
Are younger people less aware of online security risks, or do they simply prefer to take more risks with their personal information? That’s one of the questions raised by the findings of our recent poll of 2,129 U.S. adults (aged 18 and over) by Harris Interactive.
In our last post (part 1 of 2), we dove into Facebook timeline privacy and security, prompted by the universal imposition of the timeline view that is currently under way on the world’s largest social network. In this second part, we continue reviewing our Facebook timeline from other people’s perspective, using a tool called View
With the recent announcements of password breaches at LinkedIn, and warnings from Google about state-sponsored attacks on Gmail accounts, it seems like a good idea now to review some password security basics. In this blog post, we’re going to take a look at a rather low-tech solution to a decidedly high-tech problem: How to guard
Like Facebook, Twitter wants to know which websites you visit and so it has a system for tracking you as you click from site to site, a fact that leads to a pair of interesting questions: “Did you know that?” and “Are you okay with that?” As we will see in a moment, this system
Here are two staggering Facebook privacy statistics: Nearly 13 million US Facebook users have never set, or don’t know about, Facebook’s privacy tools, and only 37 percent have used Facebook’s privacy tools to customize how much information is shared with third parties. That’s according to a Consumer Reports survey released earlier this month. Given that
The consumer cloud expanded again this week with the addition of Google Drive to more familiar brands like Dropbox, Microsoft SkyDrive, Apple iCloud, and Amazon Cloud Drive. Unfortunately, most of these cloud-based file storage services come with privacy and security caveats, often involving language such as "You give us the right to access, retain, use
Attention CEOs and HR Managers: Facebook login credentials belonging to current or prospective employees are not something that any employer should request, use, or posses. Why? Apart from the violation of security and privacy principles? The risks far outweigh any benefit you imagine you could gain by logging into a social media account that does
Do you use Google? These days the question sounds almost absurd. If you use the Internet, or an iPhone, or an Android phone, or a Kindle or an iPad, then of course you use Google in some shape or form. And if you take a keen interest in how your personal information is used, you