Featured Blog

/

On October 19, 2011

Security in the Cloud, Private and Public

Where would security fall when our data is in a shared space,  when privacy is of great concern and breaches are occurring every day even in a secure network? Private clouds seem to be the answer.  Private clouds sit in a public facility on a dedicated system with very specific service-level agre ...

Read More
/

On October 13, 2011

Security policies for mobile devices

Companies may have to start spelling out security policies for mobile devices since there are no written ones, or if they do exist, they are ambiguous. Employees are provided with mobile phones so they are reachable any time, any where.  This means the employee may answer the phone while drivin ...

Read More
/

On September 14, 2011

Can you control who should have your personal data?

When it comes to credit card misuse or breach, we refer to PCI compliance standards. When it comes to personal data breach, we go looking for data security and privacy protection laws. Nowadays our personal data has found its way to libraries, online retailers, airlines and every one in between. Of ...

Read More
/

On August 29, 2011

Flash ROBS? What has data security got to do with it?

http://www.youtube.com/watch?v=rJZNYuMclNM&feature=youtu.be Social media has expanded from entertaining and exciting "Flash Mobs" to much more sinister events called "FLASH ROBS". "Flash Mobs" refer to spontaneous dancing or other antics of a group of people while "Flash ROBS" are when dozens of peo ...

Read More
/

On August 17, 2011

A vulnerable hiding place for your customer’s personal information

You are going about your daily business, when you find an old Word document in your laptop that has some Personally Identifiable customer information in it. Since you recently updated your data security policies and have decided not to store information like this outside of your password protected d ...

Read More

Stay up to date with the latest from Omega