Can Anything Go Wrong If You Don’t Log Out?


Computer Security Tip of the Week

Scott Aurnou – Logging in and out of your various online accounts over and over again can be a little annoying. And, besides, it’s your own stuff, so what’s the big deal? Well, what if you put down or step away from your computer, smartphone or tablet (or it gets lost or stolen) while all of those accounts are open…?

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel.

Tagged with: , , , , , , , , , , ,
Posted in Laptops & Desktops, Security Tip of the Week, Smartphones & Tablets

HIPAA and the Cloud: Securing Patient Data

Health CloudBy Gilad Parann-Nissany

The Health Insurance Portability and Accountability Act (HIPAA) has been around for many years with the main purpose of governing the use and disclosure of individuals’ health information. The recent dramatic trend of healthcare-driven companies to migrate to cloud computing requires a cloud-specific security approach for HIPAA and the cloud. In this article, I will touch on some of the major HIPAA requirements as they relate to the cloud, and will highlight points to consider when securing patient data in the cloud.

HIPAA cloud requirement #1: Access control
According to HIPAA, a covered entity must implement technical policies and procedures that allow only authorized persons to access electronic protected health information – this is highly relevant for HIPAA and the cloud. Once operating within the cloud, healthcare data can be potentially accessed from within the cloud by a snooping employee (one of many examples of possible breaches). To adhere to this requirement in cloud environments, address the following points:

A. Automate:
Make sure your cloud key management system [which manages the cryptographic keys in an encryption system] can be automated so that administrators cannot access or see key values used for encrypting healthcare data.
Read more ›

Tagged with: , , , , , , , , , , ,
Posted in Cloud Security, Guest Posts

The Help Desk: An Unexpected Security Risk


Computer Security Tip of the Week

Scott Aurnou – Help desk personnel are there to iron out a variety of problems and keep business operations running smoothly. As the name implies, they are there to help – a trait that hackers are more than happy to use against them to gain access and steal or sabotage your company’s sensitive data.

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel (and subscribe if you like).

Tagged with: , , , , ,
Posted in Fraud & Scams, Network Security, Security Tip of the Week

The NSA Can Decrypt Much of the Internet – What Can You Do?

G ManBy Scott Aurnou

Over the past few months, a steady stream of information regarding NSA surveillance practices obtained from former agency contractor Edward Snowden has been released through the media. While these leaks have revealed a surprisingly pervasive monitoring apparatus covering everything from apparent deals for access to data held by well-known technical companies to mass harvesting of telephone call records, the real shock came on September 5th: in effect the agency has compromised much of the fundamental encryption underlying the Internet itself, as well as a number of commercial software products thought to be secure.

This article will cover what happened, how it happened, what the effects are and what steps you can take to try and keep your private information secure from prying eyes.

The basics. The New York Times, The Guardian and ProPublica co-authored a report revealing that the National Security Agency can decrypt most of the electronic traffic on the Internet, likely including data protected via the Secure Sockets Layer (the encrypted protocol that oversees the connection between your browser and the websites it displays) and many supposedly secure virtual private networks (aka VPNs).
Read more ›

Tagged with: , , , , , , , , , , , , , , , , , , , , , , ,
Posted in Cloud Security, Laptops & Desktops, Network Security, Privacy Issues, Smartphones & Tablets