Mobile Devices Archive
Half of all firms which allow staff to bring their own device, but don’t have any firm information security policies or practices around BYOD, have suffered a security breach – according to Dell, and as reported by Out-law.com. A Dell …
Bring Your Own Device (BYOD) brings enormous potential benefits for organisations that adopt it, as well as for their employees. It also brings significant commercial and regulatory risks. In this post, I want to applaud the UK’s Information Commissioner for …
In amongst all the accusations and counter-accusations (see, for instance, this summary in Cybersecurity: Experts Wonder If New Obama Order Goes Far Enough in the International Business Times) about who is cyber attacking who, and who isn’t, two thoughts emerge: …
Another day, another (damning) survey. A recent report from Big Brother Watch “uncovered more than 1000 incidents across 132 local authorities, including at least 35 councils who have lost information about children and those in care. Highly confidential information has …
Alan Calder
November 22, 2011
Business and the Economy, Business Continuity, Compliance, Cyber Security, Data Breaches, Data Protection, ISMS, ISO 27001, ISO 27002 (ISO 17999), IT Governance, IT Security, Mobile Devices
We carried out an analysis of the data breach cases which led to the UK’s Information Commissioner extracting an undertaking from the organisation concerned. Over the last 18 months (May 2010 – mid-November 2011), this is the breakdown of 85 …
Surrey County Council’s recent £120k fine from the Information Commissioner was for failing, on three separate occassions, to assess and address the security risks of sending sensitive personal information by email. In each case, highly sensitive information ended up in …
“‘IT departments make the mistake of ignoring social media at one extreme or banning it at the other, when what they really need is a risk based strategy’, says Gartner research director Julie Short.” She is of course correct. I’ve …
Alan Calder
April 1, 2011
Business and the Economy, Compliance, Cyber Security, Data Breaches, ISO 27001, IT Governance, IT Security, Mobile Devices, social media, White Collar Crime
Gartner says that “IT & business leaders must face the fact that social colloboration is already a reality.” I agree. As a company, we have been working with social media in its varying, evolving forms for a number of years. …
According to an article published today, local councillors must register with the ICO if they process personal data in their constituency offices. Apparently 6,000 are already registered and another 13,000 could and should. Of course, registration with the ICO is …
For the Forth Valley NHS Board, the answer is now a resounding ‘Yes’. Of course, it should have been a ‘Yes’ before there was a data breach, and before sensitive patient details were put at risk. However, the Board has …