Data Breach

I am involved in a data breach.The insurance agent for a longtime client sent me loss runs that were for another insured. Actually, the insurance company sent the data to the agent. She sent it to me - and to her client.The agent didn't check what she was sending out.The error was made by the insurance company. The breach was by the insurance … [Read more...]

World Backup Day

I learned today that March 31 is World Backup Day.Who knows who decided this.  Who cares.  It's the day before April Fools Day.  Maybe that is it.A backup is a part of a plan.  I do not care about the backup.  I care that when the really bad stuff happens, that you can get back into business quickly.Here's what I think every CEO should do Monday … [Read more...]

IT Pros Not Betting on Their Own Security Measures

A recent report holds that only about half of Info Tech professionals are willing to bet on their network security.Article HereThat is not encouraging. My version:"Dear IT Professional, We are paying you to ensure that our network is secure. We believe in you. We understand that the bad guys are good at being bad.  We also know that you need … [Read more...]

Data Breach

Best Review reported this month that the average cost of a data breach is now $204 per record exposed.This includes the cost of notifying those whose records have been released, reissuing credit cards, credit monitoring services, and counseling services. Standard insurance will not pay for these expenses.  Insurers are coming out with Cyber … [Read more...]

Redundancy and Fail-Safes

How many systems failed in the BP Gulf of Mexico oil spill?How many different things went wrong, all at the same time.Can the same thing happen in your business?  Sure it can.Can the same thing happen to you in your personal life?  Sure it can.Shouldn't we be thinking about the fail-safe on the fail-safe?I've been backing my computer up for fifteen … [Read more...]

The Ten Commandments of Data Backup

I Thou shalt have a plan to backup your data.II Thy plan must include laptops.III Remote-est locations such as home-eth offices and telecommuters must be included in thy plan-eth.IV Thou shalt test thy backup plan by deleting-eth a file and retrieving it to its proper place from thy backup.V Your plan is run by mortals and will therefore devolve … [Read more...]

Credit Card Security

I will admit that I personally am not terribly worried about identity theft. I go about my life being prudent but not neurotic.I am concerned about my client's exposure to loss by credit card data-breach. Every day we hear of another merchant security problem. Every business must work with their credit card processor to limit their exposure to a … [Read more...]

Computer Access Risk

How many people can log into your company's computer system? Who can log into your computer system?How many former employees still have valid passwords? How about former consultants and systems contractors?Would this be a good time to check the list of valid logins? Yep!!! … [Read more...]