what we're reading, week of 5/25

Andrew Hay… Is Data Safer on Premise or in the Cloud? It Depends. Andrew Hay discusses whether data is more secure on the premise or in the cloud. While Andrew makes reasonable points for the cloud, he is partial to having datacenter, because he can “see, with [his] own eyes, the network, host, physical, and operational security capabilities, policies, and procedures [his] service provider will follow”. We agree Andrew, check our post from earlier in the month. Endpoint Security.info… 1 TB of data on the Clinton Administration gone missing Critical data from the Clinton Administration has been lost. The data that has been lost includes logs of events, social gatherings, and political records, as well as the social security number of a daughter of former Vice President Al Gore. CNN | Travel… How to safeguard your data as you travel Debra Allen gives readers some simple tips on keeping data secure when connecting wirelessly on...

what we’re reading, week of 5/25

Andrew Hay… Is Data Safer on Premise or in the Cloud? It Depends. Andrew Hay discusses whether data is more secure on the premise or in the cloud. While Andrew makes reasonable points for the cloud, he is partial to having datacenter, because he can “see, with [his] own eyes, the network, host, physical, and operational security capabilities, policies, and procedures [his] service provider will follow”. We agree Andrew, check our post from earlier in the month. Endpoint Security.info… 1 TB of data on the Clinton Administration gone missing Critical data from the Clinton Administration has been lost. The data that has been lost includes logs of events, social gatherings, and political records, as well as the social security number of a daughter of former Vice President Al Gore. CNN | Travel… How to safeguard your data as you travel Debra Allen gives readers some simple tips on keeping data secure when connecting wirelessly on...

log me out please.

A while back we wrote a post about LogMeIn—a web-based remote access utility, which has been claimed to be sufficient enough to replace VPN solutions. Recently, an article in Inc., A New Way to Access Files Remotely, puts forth a similar line of reasoning. Inc’s Mark Spoonauer, states, “…there’s never a reason to be stuck without that critical file. With remote-access tools, you can log in through any Web browser, anywhere in the world — even on a smartphone — and work on a screen that looks exactly like your desktop at home.” Using web-based solutions to access important information is not secure. Users run the risk of having their computers broken into and exposing their internal corporate network to Internet users. GoToMyPC, another web-based remote access utility, allows users to drag and drop files between machines and share their desktop with someone miles away—all without disclosing any log-in information. Company IT departments are then unaware of who is accessing their networks. Although these tools are convenient and serve the purpose of quick and easy access to the network, it is not by any means secure, and certainly not secure enough to replace VPNs altogether. Hannah Steiman, Editor, Inc., tweeted the other day: “What remote access software do you use? Tell us what you use and why you like it. We’ll run the best comments in Inc. http://bit.ly/aN5bC” Tweet her back, and share with her what remote access solution you use. Hopefully its something more secure than web-based remote access...

what we're reading, week of 5/18

eWeek… 10 Things you should now know about… WINDOWS 7 eWeek’s lab provides readers with the top ten features and updates to Windows 7—one to highlight, no. 5. End-Point Security… DoD can’t handle inside threats Poor security was most likely the cause of this event… James Wilbur Fondren Jr., deputy director for the U.S. Pacific Command (PACOM) Washington Liaison Office, has been charged with espionage conspiracy for providing classified information to an agent of a foreign government. The Tech Herald… Insider might have walked off with 10,000 patient records Over 30 data theft reports have been filed since January 2009, Steve Ragan reports. A John Hopkins Hospital employee, with internal access, is believed to have leaked over 10,000 patient...

what we’re reading, week of 5/18

eWeek… 10 Things you should now know about… WINDOWS 7 eWeek’s lab provides readers with the top ten features and updates to Windows 7—one to highlight, no. 5. End-Point Security… DoD can’t handle inside threats Poor security was most likely the cause of this event… James Wilbur Fondren Jr., deputy director for the U.S. Pacific Command (PACOM) Washington Liaison Office, has been charged with espionage conspiracy for providing classified information to an agent of a foreign government. The Tech Herald… Insider might have walked off with 10,000 patient records Over 30 data theft reports have been filed since January 2009, Steve Ragan reports. A John Hopkins Hospital employee, with internal access, is believed to have leaked over 10,000 patient...