Practical information policy

Does this look simple to you? I think it’s time to get back to security basics after reading the news this morning. Yesterday, there was a  run of high profile data security events: the  Mozilla store data breach, the  DDOS attack on Twitter and Web defacing  by a Palestinian cyber-terror group on leftist Israeli Kadima […]

Information security: Is psychology more important than technology?

I believe that 3 psychological reasons are the root cause of why many organizations worldwide do not take a leadership position in enterprise information protection. Preventing information security events is an admission of weakness. Why spend money on technology when the first step is admitting that you’re vulnerable? We live in an age of instant […]

Clear and present danger – on a bike.

Walking down the street this afternoon – I could not believe my eyes. I see this  bike streak by down the main street. A father riding a bike (with a helmet) and baby in back seat (with helmet) – talking on a cell phone. Now That’s Foolish and Dangerous.

Is security a washing machine?

Most security appliance vendors use fluffy charts with a 4 step “information risk management” cycle. It’s always a 4 step cycle, like Symantec’s DLP  “Discover, Monitor, Protect and Manage” and it’s usually on a circular chart but sometimes in a Gartner-style magic quadrant or on a line. It’s like a washing machine cycle that never […]

Data discovery for data loss prevention

A few years ago I did some work for an Israeli startup called nLayers that did  applications, servers and devices discovery. They were later acquired by EMC. I thought it was a brilliant idea at the time, since large IT organizations don’t really know what assets they have in their IT portfolio. Therefore, it should […]

Swine flu and social networking

It just occurred to me – as our partner in Poland was getting ready to drive from Warsaw to Łęczyca for a sales call – that novel H1N1 (swine flu) and seasonal influenza is a great reason to use social media and Web conferencing for customer contacts, sales and support and reduce physical contact and […]

Value based decisions

If you read Robert Heinlen you know TAANSTAFL –  “There ain’t no such thing as a free lunch”. In the PC world of 2010 we say  stuff like “there is a need for value based decisions in health care”. Over 20 patients a day die in the UK,from the superbug infections, MRSA and C difficile. […]

It’s My Way or “La Puerta”

The role of a supervisor in protecting company data. There is a feeling of entitlement in the Western world that enables employees to use company resources for private purposes.  If can use a pencil, you can use a phone, if you can use a phone, you can use your PC to surf the Net on […]

Data protection for an SME

As Ben Franklin said – “an ounce of prevention is worth a pound of cure”. Three misconceptions regarding data protection and data loss prevention are prevalent in small to medium sized organisations –  whether in manufacturing, distribution or education or in a service business.  In my professional security practice over the past 5 years providing […]

The threat behind the House Tri-Committee Bill on Health Care

Don’t ask me why, but I was invited (and joined) the Pakistan Networkers group on LinkedIn.  I see all kinds of cool job opportunities in the Emirates which I can’t really take but the traffic is interesting. I saw this picture in a post today from the Pakistan Networkers group. It graphically describes the complexity […]