Yet another breach of sensitive, unencrypted data is making news in the United Kingdom. This time the breach puts Royal Air Force staff at serious risk of being targeted for blackmail by foreign intelligence services or others.
The breach involves audio recordings with high ranking officers who were being interviewed in-depth for a security clearance. In the interviews, the officers disclosed information about extra-marital affairs, drug abuse, visits to prostitutes, medical conditions, criminal convictions and debt histories — information the military needed to determine their security risk. (link)
- Home
- Blog
- Intro to Hard Drives
- Data Recovery Articles
- Data Recovery Australia
- Data Recovery Barbados
- Data Recovery Blog Feed
- Data Recovery France
- Data Recovery Germany
- Data Recovery Services
- Data Recovery Singapore
- Data Recovery Software
- Data Recovery RAID
- Data Recovery UK
- Link Partners
- Link Resources
- Privacy
- BAD Reciprocal Partners
0 Comments
Bill Margeson, co-founder, president, and CEO of CBL Data Recovery Technologies (www.cbltech.com), says the notebook is becoming the computing platform of choice vs. the larger PC workstation. He says, “The notebook affords individuals mobility, but not without risks to both the hardware and the corporate data stored on it. Notebooks are more prone to being bumped, jarred, and dropped, thus increasing the risk of physical damage and subsequent data loss.” That made recovering the DVD data even more important. Two local data recovery firms had already said the videotaped interview on the DVD was unrecoverable. But by chance, Isaac's parents had a neighbor who was a retired Seagate employee. Having heard of Seagate, Isaac decided to contact the company about a medium they didn't even manufacture, hoping they could recover the data. When IEEE 1667 is in place, the risks associated with this vulnerability decrease substantially because only authenticated devices will be accepted. I can provide my employees with specific types of IEEE 1667-compliant devices that can be authenticated and used. All others, including that device you bought at Fry's Electronics, won't work. Assuming that you can audit the use of these devices, this provides security without compromising usability--a win-win in the security management world. (link) As part of a compliance project launched one and a half years ago, Brent Zimmer, systems specialist at the university, was working with attorneys and archivists to determine which data was most important to keep and for how long. But it soon became clear that it was just as important to identify which data should be thrown away. Zimmer was aware of the importance of being able to quickly produce required information during litigation, "but the thing we never thought about was keeping data too long," he says. The risk is keeping data that you wouldn't otherwise be required to produce, but as long as it's discoverable, it could be used as evidence against you. (link) Buying faster switches might not be the only way to amp up performance across data center networks, according to researchers at the University of California, San Diego, who this week proposed a network architecture that would enable commodity Ethernet switches to deliver better performance at a lower cost than their 10 Gigabit Ethernet counterparts. No matter which operating system is currently installed on your computer, the number one concern is always the persistent necessity to keep all data secure. If you are among those who chose to use Vista on their PCs and laptops, like the rest of us, you are probably experiencing difficulties in finding effective system utilities that can optimize your work with the operating system. And it just looks like the time is right for all Windows Vista users to start looking for the solution that would allow them to effectively backup Windows Mail. So what do you do if you haven’t been using a backup plan and your system crashes or a virus wipes out your files? You will probably have to call in the pros at this time. There are many companies that specialize in recovering data from any type of media for just about any type of system failure. Some of the companies also specialize in recovering certain types of files that have been corrupted. For example, if you have a corrupted Microsoft Excel file, look for a company that specifies expertise with that type of file. Spam (and the malware it contains) may be a tremendous concern to most IT companies, but information from a new Trend Micro survey suggests that it has become more of a managed concern, and is being superseded as a top priority threat by another issue: data leaks. While they may or may not be intentional, data leaks have the potential to expose thousands or even millions of records to theft. A study released Monday by the privacy-focused Ponemon Institute and funded by e-mail marketing firm Strongmail reveals a disturbing disconnect in companies between the executives tasked with protecting customer data and marketing departments, which use the data for advertising purposes or share it with third parties. |
AboutData recovery perspectives from an IT specialist, who's seen it all. Archives
May 2009
Categories
All
|