Blog

I Want YOU…
Cybersecurity Data breach Data security Insider threat Mobile security Print security Privacy

PrivacyTo think about stronger data security and privacy protection! But first, I want you to think about the millions of heroes who have served our country.

As we approach the 4th of July, I wanted to take a moment to recognize the heroes in the many branches of the U.S. Military.  From myself, and on behalf of the entire team at Fasoo, THANK YOU for your service!

And while thinking about those who have put themselves at the first line of defense, defending our country and fighting for our freedom, we are still fighting for privacy and stronger data security.  As individuals, we are required to provide tons of personally identifiable information to our doctors, lawyers, employers and financial institutions – trusting that they will safeguard our information.  But data leaks still happen!  So we know we need to take data security and privacy seriously.

Now, I don’t want this discussion to turn political, but it was brought to my attention (thanks, Rick), in an article published by ZDNet that “The US State Department will now require new visitors to the United States to hand over their social media account names as well as email addresses and phone numbers used over the past five years.”

I remember when I was a kid, the USA was referred to as “The Great American Melting Pot” where people were welcomed from all over the world to come here and live their dream!  Freedom.  In fact, my own family migrated from Hungary and settled in Pennsylvania in the early 1900s.  Of course, this was long before the digital age.  Back then, the information collected, while personally identifiable in nature, was not nearly as much in terms of “volume”.  So while people are still coming to this country to live their dreams, the data requirement to do so is a magnitude far above what it used to be, exacerbating the amount of data that needs to be protected.   So what I am saying here is that these visitors’ dreams should NOT include the fear of identity theft and/or exposure of personal data.

In the digital age, our thirst for knowledge and expression has us willing to give information in exchange for merchandise, a whitepaper, maybe even recognition.   And we should be able, with trust and the freedom to do so, without fear.  So at the risk of misquoting one of our Founding Fathers, those who would give up personal data for essential freedom, deserve both privacy and security.

So fire up the grill, add another hot dog or hamburger, tofu for my vegan friends, crack open a beer or have some wine.  Enjoy your friends, family and freedom and by all means, please have a safe holiday!

By Deborah Kish – EVP Research & Marketing

You May Need a “Remote Kill Switch” for Your Documents
Cybersecurity Data breach Mobile security

document kill switchBetween the alleged hacks from the Russian government in the news and the constant barrage of data breach headlines, it is obvious that the loss or theft of confidential data is a top priority for most organizations.  With the proliferation of mobile devices this is becoming even worse.

While reports from numerous analysts predict a slow down in growth of mobile devices, the number of business users that use phones and tablets to share information is at an all-time high.  Considering that thousands of mobile devices are lost or stolen each month, companies need to understand the issue of exposing confidential information.  Phone manufacturers have long employed the ability to remotely kill a lost cell phone or application that may cause issues on the device.  Numerous MDM (mobile device management) applications can also do a remote wipe and help to protect devices.  So you think that you have all the bases covered – think again!

Healthcare Data Breach – Unauthorized Access for Seven Years
Data breach Data security Insider threat Mobile security Print security Privacy

Healthcare Data Breach - Unauthorized Access for Seven YearsUnityPoint Health-Allen Hospital has made the news very recently as one of the latest healthcare environments that had a data breach. While on the surface this news appears to be just another healthcare data breach, there is something very different about it; the breach occurred over a span of seven years and was only recently discovered and reported.

A “former employee” accessed 1,620 patient records that contained personal information and may have seen patients’ names, home addresses, dates of birth, medical and health insurance account numbers, and health information related to their treatments.

The Allen Hospital compliance team detected inappropriate access that started in September 2009 and ended in March 2016.  They started a review that resulted in the notification of the breach to the U.S. Department of Health and Human Services and impacted patients.

Why was this inappropriate access not immediately detected with all the technology in place to ensure HIPAA compliance?  What was missing?

Data-Centric Security in the Boardroom
Data breach Data security Mobile security Print security Privacy Secure collaboration

Boardroom Data Security starts by protecting board communications and documentsWith so many high profile data breaches in the public eye recently, cyber security is now front and center in many organizations.  Globally cyber attacks and data leaks are daily threats to organizations, reminding everyone that we are all potential targets. Attorneys are warning about potential individual liability for corporate directors who do not take appropriate responsibility for oversight of cyber security while investors and regulators are pushing boards to step up their oversight.  As a result, corporate boards have woken up to the call that they must address cyber security issues on their front lines, as it is no longer just an Information Technology issue.

Is the FBI Request to Unlock an iPhone a Good Idea?
Data breach Data security Mobile security Privacy

Is the FBIs Request to Unlock an iPhone a Good IdeaOn February 16, 2016, a US judge ordered Apple to help the FBI search an iPhone belonging to the man responsible for the recent mass shooting in San Bernardino, California.  The shooting, which the FBI has classified as a terrorist attack, is under investigation and the agency is trying to understand details that they are hoping to find on the shooter’s iPhone.

The phone is protected by Apple encryption and user credentials, and the FBI hasn’t been able to hack into it.  The judge ordered Apple to disable or bypass the functions that protect the phone by erasing data after a number of failed attempts to access it.  This, according to the order, will assist the FBI in its investigation.

Protect Against R&D Data Theft
Data breach Data security Insider threat Mobile security Print security

Protect Against R&D Data TheftRecently I was in a meeting with a global pharmaceutical client in New Jersey who told me of the importance they place on their highly secure, centrally managed and monitored persistent security platform to protect against data theft and ensure that their valuable R&D information cannot be lost or inadvertently sent to a competitor.

As the meeting ended, I was informed of the news about the charges brought against five people in the Untied States around trade secret theft inside another global pharmaceutical company. Allegedly a senior level manager at the company was involved in this theft.

Given the global state of business competition, there is a special appeal to the cyber thugs with high-priced or high-demand items. There is an alarming interest in stealing intellectual property, trade secrets and exactly how these items are produced.

Mobility and Prevention of Employee Data Theft
Data breach Data security Insider threat Mobile security

Use persistent data security to prevent data theft in a mobile worldGone are the days when everyone came into the office everyday for work.  Changes in work habits have brought substantial growth in mobility adoption within the workforce and security challenges have followed.

Today’s employees increasingly work from outside the office and they use a number of mobile (often personal) devices to complete their daily business tasks.  Gallup’s Work and Education Poll from August 2015 points out that telecommuting for work has climbed up to 37 percent in the United States.

A June 2014 survey by Gartner points out that approximately 40 percent of U.S. consumers who work for large organizations said they use their personally owned smartphone, tablet, desktop or laptop daily for some form of work.  Mingling business and personal data can and does cause major security problems, since all of us may inadvertently share sensitive company information with the wrong person.

10 Tips To Make You A Cyber Smart Holiday Shopper
Cybersecurity Mobile security Privacy

10 Tips To Make You A Cyber Smart Holiday ShopperAs we move into the week of Thanksgiving in the US, some of us start thinking about eating, family and football; not necessarily in that order.  Others start thinking about shopping for the holidays.

Next week is Cyber Monday and I think it’s a little easier on the feet and constitution than Black Friday.  I would rather go online and go after all the bargains, rather than waiting in line and fighting all the crazy people out there trying to get $50 off a television.  But to each his or her own.

As with anything online, you need to take the good with the bad.  There will be a lot of great deals from reputable sites, but watch out for scams.  Online scammers try to game the search engines with “legitimate” bargains.  You search for a bargain and the link takes you to a site that looks legitimate. Check to see that it is a legitimate merchant before you buy anything.  Some are just sites with malware that could wreak havoc on your computer.