November Data Breaches: Learn from Others’ Mistakes

Each month, eSecurity Planet looks back at data breaches we’ve covered over the past 30 days or so, providing an admittedly unscientific but potentially interesting overview of the current breach landscape.

To get some perspective on the current threat landscape, eSecurity Planet spoke to F-Secure security advisor Sean Sullivan. In this first of two parts, we list the past month’s breaches by category, noting what happened, what data was exposed and what the organization is doing in response – along with Sullivan’s thoughts on many of the breach categories…

When considering ways to mitigate the potential impact of a stolen device, Sullivan says it’s crucial to keep in mind that full disk encryption is much easier to implement than it used to be. “We’ve been doing full disk encryption at F-Secure since I came here in 2006, and it was more painful in 2006,” he says.

And simply providing employees with better laptops, Sullivan says, can also help. “My work laptop has a solid-state drive, it boots up in less than 30 seconds, and it’s light and portable; I wouldn’t leave it in the car,” he says. “It’s not difficult to lug around.”

Providing employees with training and with a clear sense of responsibility for the data they’re carrying around can also make a significant difference.

via November Data Breaches: Learn from Others’ Mistakes – eSecurity Planet.

———————————————-

Journal of Law & Cyber Warfare | www.jlcw.org The Journal of Law & Cyber Warfare provides a public peer-reviewed law publication to foster open discussion and education of technology, government and legal stakeholder in relation to the complex issue of cyber warfare.  Journal of Law & Cyber Warfare accepts articles written by military, technology, judges, government officials, academic and legal practitioners.  The Journal of Law & Cyber Warfare provides a public peer-reviewed law publication to foster open discussion and education of technology, government and legal stakeholder in relation to the complex issue of cyber warfare.  Journal of Law & Cyber Warfare accepts articles written by military, technology, judges, government officials, academic and legal practitioners. The Journal of Law & Cyber Warfare is honored by the world class caliber editorial board that is involved with the Journal. Thought leaders from forensics, law, warfare, and cyber security are on the Board. The Journal is always looking for interested thought leaders who believe they can contribute in a meaningful fashion to the development of cyber warfare scholarship.