Tag Archives: personal

Failure To Encrypt Data May Lead To Serious Data Breaches And Hefty Fines

Organizations have to undertake a serious review of the way they handle data or the level of security of their information network. A school’s ignorance of the need to encrypt mobile and portable devices has led to a breach of the Data Protection Act, after a laptop was stolen from a teacher’s car, the Information Commissioner’s Office has found.

Freehold Community School in Oldham was said to have broken data laws when the unencrypted device containing personal information on 90 pupils was stolen from the car parked at the teacher’s home. Enquiries from the ICO found the school was not aware of the need to encrypt such devices. A school policy informing staff that storage devices should not be kept in cars away from school premises was however in place.

“The fact that the school was unaware of the need to encrypt the information stored on their laptop shows that many organizations continue to process personal information without having the most basic of security measures in place,” said Sally-Anne Poole, the ICO’s acting head of enforcement
Virgin Media Limited is an example of a large organization to be held to account for a breach of the UK’s Data Protection Act 1998 (DPA). The breach seems to have occurred following the loss of a compact disc that was passed to Virgin Media by Carphone Warehouse. The disc contained personal details of various individuals’ interest in opening a Virgin Media Account in a Carphone Warehouse store.

Virgin Media was required, with immediate effect, to encrypt all portable or mobile devices that store and transmit personal information. Further, the company is to ensure that any service provider processing personal information on its behalf must also use encryption software and this requirement has to be clearly stated in all contracts.

Over the past years laptops (Marks & Spencer), DVDs (HM Revenue and Customs), and memory sticks (PA Consulting) have all gone astray, with the potential loss of thousands of records.
Recently, the Ponemon Institute surveyed 275 European organizations in its latest lost laptop report to determine the economic consequences of having a laptop lost or stolen. It was found that participating organizations lost over 72,000 laptops during a 12-month period for a total economic impact of $1.79 billion, according to the “The Billion Euro Lost Laptop Problem” report, released in April. The researchers calculated that on average, each laptop loss cost participating organizations about $6.85 million in 2010.
The European study complemented the earlier Ponemon Institute’s December study which surveyed 329 organizations in the United States about laptop loss. Respondents lost more than 86,000 laptops over the course of a year, according to “The Billion Dollar Lost Laptop Study.” The report valued the total cost at $2.1 billion at the time.
When the resulting losses from the European study are combined with the US study, the total damages ballooned to $3.9 billion across almost 160,000 lost laptops in the space of one year. Only 34 percent of lost laptops were encrypted, 26 percent were backed up regularly, and seven percent had other anti-theft features enabled, according to the European report. There were other similar trends in the European and US studies. Both reports found that roughly 30 percent of the lost laptops contained confidential data that was not encrypted.
Organizations have to pay more attention on data policies, and have a proficiently skilled IT security workforce in order to avoid cyber attacks and security breaches. IT security professionals can increase their information security knowledge and skills by embarking on advanced and highly technical training programs. EC-Council has launched the Center of Advanced Security Training (CAST), to address the deficiency of technically proficient information security professionals. CAST will provide advanced technical security training covering topics such as Advanced Penetration Testing, Digital Mobile Forensics, Advanced Application Security, Advanced Network Defense, and Cryptography, among others. These highly sought after and lab intensive information security training courses will be offered at all EC-Council hosted conferences and events, and through specially selected authorized training centers.

Multiple Web Hosting of Datacenters

What exactly does multiple web hosting of datacenters refer to and why is it there? Does it cost a lot? Is it useful to your business? Is it something you should look into? Find out today.

As everything is based on technology, there is no real need to actually know the specifics of its functions. You simply have to know about the basics, like what a particular software or practice or program does, why it would be essential and how it could help you?

Naturally, it wouldn’t be enough just to know that it’s there; you need to find out why it is used and what it could do to reduce costs, improve your overall business and your life.

This would be especially true when it comes to multiple web hosting of datacenters. If your business happens to be online, you probably already have a service for web hosting. In general, a service of web hosting refers to a kind of online hosting service which lets organizations and individuals create a personal website that can be accessed via the internet.

Web hosts refer to companies which offer web server space for their clients along with internet connections through data servers. These web hosts are also able to offer internet connections and datacenter space for servers near their actual datacenters. This would be known as web collocation, and allows for multiple web hosting of datacenters.

In general, multiple web hosting of datacenters can affect the overall speed of accessed websites. Aside from small percentages of big companies of web hosting all over the world, the majority of companies of web hosting that are located in the United States of America offers local business services. Several of the biggest datacenters can be found in the U.S. and a lot of these companies of web hosting make use of their personal dedicated servers.

Several overseas websites and businesses use U.S. company services. Unfortunately, their websites load slower and they lack in overall performance. Because of this, businesses that target local customers often times make use of providers of web hosting that also use small local datacenters that are unreliable.

Multiple web hosting of datacenters can be seen as solutions to outsourcing. A lot of companies of web hosting relocate their personal servers to brand new datacenters. No matter which company you opt for to offer your website or business with multiple web hosting of datacenters, they will still be responsible for website administration along with any problems that might come about. However, brand new datacenters in themselves will offer bandwidth, server space, electricity, and routing.

Keep in mind that multiple web hosting for datacenters has nothing to do with reselling. Companies of web hosting that opt to mover personal servers to such datacenters will still be the owners of their personal servers, along with good percentages of the switches and routers which connect servers to a datacenter’s connections to the World Wide Web.

by Loren Allen

How to Protect Your Personal Information Privacy on Internet?

You must protect your personal information privacy on the internet, because unlike people, the internet never forgets! The internet has made everything easy- from buying books online to buying vegetables; it also lets you share your personal details, credit card number, phone number and email with anyone, anywhere, at any time, but not without some risk to your privacy. Whenever you put your personal information in cyberspace, whether inadvertently or by intention, it may be not possible to control who uses it or how and anyone could use it to embarrass you, damage your online reputation or worse for monetary benefits.

This article explains the key features that you must know to protect your personal information privacy online and take control of your reputation.

Check for a Privacy Policy

Before entering personal identity information like your name, phone number, credit card, address and other similar sensitive information, make sure to check if the website has a privacy policy page. If it is missing a privacy page, leave the site and find another site that provides same service or product that has a privacy policy protecting your personal information. Do not take the risk of identity theft with mistrusted sites because if they do not have a privacy policy page, they aren’t worth trusting.

Think before you Share

While using social networking or photo sharing sites like Facebook, Twitter, Picasa, YouTube and MySpace or forums and chat sites, put some thought on what you are posting before posting. Keep your personal information such as address, email and phone numbers private. Change the password of your email every month and manage your passwords responsibly, which means to avoid using same passwords for every email or in any new website you join. Don’t use the same password for your credit cards or bank accounts in your online transactions.

Use Personal Information Privacy Services

A personal information privacy service alerts, monitors and helps the frequent web surfers in managing online reputation by protecting personal information on the internet. It warns you if too much personal or inappropriate information is found about you online. Along with that, it also detect misuse of your identity, stop unwanted catalog and mail spam, enable browser privacy using easy to install plug-ins and cookie removal tools and more.

The internet offers various opportunities and has a lot of constructive information and resources that are accessible at your fingertips. Use precautions and make your web surfing a safe and enjoyable experience!