Archive for March, 2011
7 Sources of Data Breaches You値l Never Hear About: Your Old Windows 95 Computer
Posted by Titus in Data Breaches on March 29, 2011

Digital pack rat: You probably have a backed-up copy of your old 256 MB hard drive, don't you? Licensed from Stock Exchange.
This is the fifth post in a series about data breaches you can prevent. We致e covered Phones and Personal Computing Devices , Your Browser, and Your Inbox, and Your Thumb and External Drives. Next we値l discuss Your Old Windows 95 Computer.
Technology has made it easier than ever to be a digital pack rat. Cheap and plentiful memory probably means that you have backed-up a copy of your old 256 MB hard drive, which you also have stashed somewhere in your basement. Before blindly making back-up copies of old hard drives, make sure that you first delete any information you don稚 want to save.
7 Sources of Data Breaches You値l Never Hear About: Your Thumb Drive
Posted by Titus in Data Breaches on March 24, 2011

The Law of Portable Device Breaches says that the risk of losing a device, and the information thereon, is directly proportional to its portability. Licensed from Stock Exchange
This post is the fourth in a series about data breaches you can prevent. We致e covered Phones and Personal Computing Devices , Your Browser, and Your Inbox. Here we値l explore Your Thumb and External Drives.
Just about anything that can store information can be used to store sensitive personal information. Whether you use an external drive to back up sensitive data, or use a thumb drive to transfer large files from one computer to another. The Law of Portable Device Breaches (which I just made up) says that the risk of losing a device, and the information thereon, is directly proportional to its portability. In real terms, this extremely scientific law means that you池e more likely to leave your cell phone at the bar than your desktop computer.
7 Sources of Data Breaches You値l Never Hear About: Your Browser
Posted by Titus in Data Breaches on March 17, 2011
Laptops, desktop computers and smartphones all have built-in internet browsers. A typical browser can store hundreds of passwords and usernames, credit card numbers, contact information, and browsing history. Even though we use our smart phone browsers to do a significant number of online transactions, typical smart phone browsers do not allow users the same degree of privacy control as desktop browsers.
7 Sources of Data Breaches You値l Never Hear About: Your Phone
Posted by Titus in Data Breaches on March 15, 2011

Smart phones are now portable computers which just happen to make calls. Licensed from Stock Exchange.
Remember when cell phones were telephones? Those days are long gone. The current generation of smart phones are powerful computing devices which just happen to also make phone calls.