Julie Forster reports: The state agency that administers unemployment benefits is addressing concerns that it lacked adequate security controls for its computer system, leaving private information about applicants vulnerable to data breaches, according to a legislative audit report. The Dec. 3 report details the lack of controls with the massive Department of Employment and Economic…
Category: Commentaries and Analyses
Ca: Alberta health board cleared in records breach
Because we don’t have a privacy commissioner who actually — gasp — investigates breaches and issues findings, and all we have is HHS which doesn’t publish its findings and leaves us generally in the dark, this report out of Canada is especially interesting. The Alberta privacy commissioner’s office has found that the province’s health board…
Jon Stewart on TSA’s security gaffe
If you’ve been following the Transportation Security Administration’s gaffe in posting a manual online that was not securely redacted, you might enjoy Jon Stewart’s take on it all. I posted this to Chronicles of Dissent, but realized that heck, since it is a commentary on inadequate security…. enjoy! The Daily Show With Jon Stewart Mon…
Heartland Lawsuit Dismissed, “Insufficient Evidence” Of Weak Security
Evan Schuman discusses a judge’s dismissal of a shareholder lawsuit against Heartland Payment Systems over on StorefrontBacktalk, here, that is well worth reading.
WV: Policy to wipe old state computers is working, lawmakers told
Phil Kabler reports: A random audit of state computers up for sale through the Surplus Property division found that an initiative to assure that all hard drives are wiped clean is working, a report released Tuesday shows. Chief Technology Officer Kyle Schafer told a legislative interim committee that the policy was adopted in 2006, after…
Verizon Business Issues 2009 Supplemental Data Breach Report Profiling 15 Most Common Attacks
Verizon’s press release: The latest in the Data Breach Investigations Report series by Verizon Business security experts provides enterprises with an unprecedented look at the 15 most common security attacks and how they typically unfold. In the “2009 Supplemental Data Breach Investigations Report: An Anatomy of a Data Breach,” Verizon Business security experts tap the…