Take Back Control. Executive Summary

Size: px
Start display at page:

Download "Take Back Control. Executive Summary"

Transcription

1 Take Back Control There's no such thing as secure anymore. Debora Plunkett, NSA Executive Summary Businesses violate your privacy every day because collecting, using, sharing, and even losing your personal information is justifiable way to make more money. And as Edward Snowden has shown us, government agencies like the NSA routinely break the law with their own data collection practices. Over the last few years, privacy has grown from a back-office compliance issue into a global problem affecting more than a billion people. But there's another problem the Internet itself is at risk because much of its underlying security is getting too complex and less secure. The most common encryption technologies are being "cracked" by entities ranging from government agencies to anyone with access to new, powerful computers. And yes, they will one day be available to everyone using the Web. So, the bad news is that the security problem has to be solved along with the privacy problem. The good news is that this White Paper explains how both security and privacy will be solved. MasterCard, Visa and American Express announce a new global standard to make online and mobile shopping simpler and safer. October 1, 2013 The author of this White Paper has long been a force in data security, with about twenty issued and pending patents. Many financial institutions are adding similar technologies to make sure that credit cards have the latest and best security. The privacy problem has been solved by a firm and product called Make It Private (MIP). Its solution is simple: give each person control of his or her personal information in a way that can be used on any Website. This means that more that a billion Facebook, Gmail, Yahoo Mail, Hotmail, Google Docs, Office 365, etc. users finally have the option of privacy. This also means that millions of businesses will have desirable features like redactable and centralized control. The consumer version of MIP will be available for the 2013 Christmas season and is priced so that anyone wanting to take back control can afford it. The enterprise version of MIP will be available in early 2014 and will be priced to be less expensive than the vulnerable security products that it replaces. The less we know about you, the better we can serve you Page 1

2 If you re not paying for it... you re not the customer. You re the product being sold. EU Data Regulation: Protect EU residents outside the EU. Require specific explicit consent. Safe transfer of data outside the EU. Data breach notification within 24 hours. Penalties up to 2% of worldwide sales. The right to be forgotten. The right of portability. Wall Street Journal Security means the ability to prevent information from being inadvertently or deliberately disclosed. If encryption is safe, why do the standards keep changing? And what happens to all the files stored with an old standard? The NSA spent $250 million to undermine encryption systems used by millions of people around the world. New York Times Once quantum computing comes into play, it's game over for conventional cryptography. InfoWorld Industry Background Privacy in the US is a compliance issue and is something that companies are forced to do, so they make the most out of this compulsory expense. To illustrate, the first Chief Privacy Officer course was offered back in 2000 and focused on things like preparing a company spokesman and how to testify before a committee... but nothing on how to actually protect a person's privacy! Privacy Policies themselves are misleading because they are linked to Terms of Use that eliminate any right to privacy. Google's, for example, states that if there is a data breach "WE EXCLUDE ALL WARRANTIES." Google is not alone more than 10 million Websites have similar disclaimers. The reason is simple collecting personal information is how companies make more money. Things are very different outside the US. In Europe, privacy is explicitly regarded as a fundamental human right. This can be traced back to how the Nazis used punched cards to track Jews. Today, Germany is a leading privacy advocate to make sure that government tracking and abuse never happens again. The 1998 EU Data Directive was a first attempt at protecting its citizens. In spite of its flaws, the Directive has been adopted by all industrialized nations except the US, including our neighbors Canada, Mexico, and the Pacific Rim countries. In business, firms like Facebook have raised privacy awareness to the point where almost half of those who quit do so because of the lack of privacy. But with more than a billion users, Facebook sees this as a justifiable cost of doing business. These differences between the anything-goes US perspective and the fundamentalhuman-right EU perspective has been a source of conflict for years, and there are ongoing threats of a US-EU trade war over privacy. Two related events recently pushed this privacy debate onto the front pages. The first was the announced overhaul of the EU Data Directive with a proposed new EU Data Regulation ( "directive" was optional, "regulation" is mandatory). The Regulation contains provisions like the "right to be forgotten" and stiff penalties for noncompliance. Not surprisingly, US lobbyists have worked hard to delay or kill the Regulation, calling it "technically impossible." The second event was Edward Snowden's disclosure about the NSA spying on everything from foreign governments to US citizens. These two events are related because the outrage towards the NSA has crippled any opposition to the proposed Regulation. Many US policymakers are frustrated with the lack of privacy leadership. On September 24, 2013, California announced a new law that would give its teenagers an "erase button to delete their Web mistakes." This is a direct copy of the new Regulation's "right to be forgotten." When the Wall Street Journal asked if there should be laws allowing people to remove data about themselves from companies that compile similar profiles, the overwhelming majority said Yes. The need for privacy is finally being debated everywhere, from the United Nations with the President of Brazil "launching a blistering attack" against US policies, to millions of dinner tables around the world. The Other Problem Encryption Before there can be any hope for privacy, there has to be a way to store personal information securely. Currently, this is being done using encryption technologies. This is where data is scrambled with the hope that it cannot be later unscrambled, or "cracked." But as computers get more powerful, this cracking becomes easier. Recent disclosures reveal that the NSA has found ways around encryption, and that it has also intentionally subverted encryption standards to make them even easier to crack. Bruce Schneier, one of the most respected encryption experts, has admitted, "the NSA is able to decrypt most of the Internet" calling this revelation "explosive." To make matters worse, new computers are being developed that will have nearinfinite processing capabilities. They're called "quantum computers" and Google and the Chinese government already have them. Recent reports have stated that these new computers will crack some of the toughest encryption known to man and will put state secrets, financial transactions, and personal information at risk. The less we know about you, the better we can serve you Page 2

3 Make It Private asked HP, IBM, Symantec, and McAfee how their encryption products protect against quantum computers. None had an answer or even a plan. While expensive now, a quantum computer manufacturer has stated that they will one day be available to anyone with Web access. As one headline says, "With Encryption Being Insecure, Whom Do You Trust?" Some feel that this even puts "military grade" security at risk. Even if encryption was able to support the new privacy laws ( such as the new "eraser button," which it does not), encryption is not a sustainable way to protect personal information. Introducing Tokenization Merchants won t have to worry about keeping payments secure and consumers won t have to worry about getting hacked. Pymnts.com The conceptual solution was in part derived from an interesting source. During World War II invading armies stole art, and one of the most prized art forms was the stained glass in cathedrals. French priests did something both simple and brilliant they gave each piece of glass to a different parishioner who was told to hide it in a safe place. At the end of the war, each person was told to bring back his or her piece of glass. The art was impossible to steal because it was stored in multiple locations that were unknown by any one person. The individual pieces of glass had no value without a context, and the context (the lead frame) had no value without the stained glass. The latest and best type of security does the same with data it removes sensitive fields from a file and stores them in separate locations. The original sensitive fields are then replaced with random pointers, or "tokens," that are later used to locate the sensitive fields, but only if and when a user authenticates and has permission. These fields are then seamlessly merged back into the original file for processing. Some refer to this process as "tokenization." MasterCard, Visa and American Express have announced tokens as a new global standard to make the Internet simpler and safer. Tokens do not require complex key management. But their major benefit is that the original file does not contain sensitive data, so it cannot be cracked because the sensitive data is simply not there. Major firms like IBM, HP, and Dell have begun to do the same because tokens solve the problems associated with encryption. Here's how Teradata sums this up: Encryption is notoriously expensive to implement and manage. Tokenization s ability to improve security and slash compliance expense makes it uniquely attractive. Yankee Group At Make It Private, we know a lot about tokenization, based on a longstanding history of patented inventions in the areas of consumer privacy and data security. The Hidden Power of Tokens Even the major firms do not fully appreciate the benefits of how we design products. For example, encryption strength and token strength are very different: Encryption strength comes from when a file was created, not when it is accessed. Token strength comes from when a file is accessed, not when it was created. With encrypted files, everything is locked in time with the assumption that nothing can be cracked. Encryption strength is limited by the standard at the time a file is created. Tokenized files are not locked in time because there is nothing to crack. Instead, their strength is tied to the latest authentication technologies at the time a file is accessed. So unlike encryption that get weaker over time, tokens actually gets stronger. In addition, tokenized content can be changed and made more relevant based on who the recipient is, and where and when it's being accessed. Embedded forensics also record how a hacker attempts to crack sensitive information, even though nothing is ever at risk. With the security problem solved, we can now focus on solving the bigger problem. The less we know about you, the better we can serve you Page 3

4 What Is Privacy? Privacy means the ability to retain control of information after it has been disclosed. The word "privacy" cannot be found in the Declaration of Independence, the Bill of Rights, or any of the Amendments. A century ago, Supreme Court Justice Louis Brandeis defined privacy as "the right to be let alone" which he said was one of the rights most cherished by Americans. About fifteen years ago, the Center for Democracy and Technology said, "Justice Brandeis' vision of being 'let alone' no longer suffices to define the concept of privacy in today's digital environment. Individuals should be able to interact in modern society without losing control over their personal information. The modern right to privacy also entails, therefore, the right to control our personal information even after we disclose it to others." "Control after disclosure" is privacy's Holy Grail. It gives individuals (and companies and governments) the ability to control their data when, for example, it's stored in the cloud or sent to someone via . Teenagers need special protection as they text an average of 3,000 times every month! The problem is that no products offer control after disclosure. Until now... Introducing MIP is a browser plug-in that gives everyone the "technically impossible." By simply right-clicking a field, the contents are separated and sent to a highly secure token vault. The private information never touches the Website: Websites sell or leak your private information. You have no control. Right-clicking a field stores private information in a separate, secure vault. You have total control. It s wonderful how well men keep secrets they have not been told. Individuals, companies, and even government agencies now have: Privacy and security that cannot be cracked, even by a quantum computer. Privacy's Holy Grail control after disclosure. Support for Justice Brandeis' right to be let alone. Support for the new EU Data Regulation, including the right to be forgotten. Support for the new California "eraser button." MIP raises the privacy bar in additional ways: A user's name and personal information are never requested by MIP. As shown in the stained glass example, everything in the vault is stored out of context in random bits. A government order to hand over the tokenized information for Jane Doe would result in us saying, Who s that? If the order included a specific User ID or address, we would comply by handing over random bits of information without any context. Here are just some of the steps a hacker must use to break MIP's privacy: 1. Know which token vault (or vaults) to break into. 2. Crack internal encryption (can be done, this is just a speed bump). 3. Know what file (or files) to access. 4. Know what data in the file(s) is real vs. just "background noise." 5. Know what bytes in the data are significant. 6. Know how the pieces of the bytes are to be put together. 7. Know how to put the bytes together to form the content. The less we know about you, the better we can serve you Page 4

5 To break the privacy of any other privacy (or security) product requires only the second step. Congratulations to any person who does all seven MIP steps! But even if successful, they will only have a word like "Smith" or a number like " " What Smith or (the piece of glass) relates to is still unknown because there is no supporting context (the lead frame). And the context is stored in an unknown file on an unknown client device. Personal information with no context is still private. One of the developments stemming from the Edward Snowden disclosures is that individuals, companies, and even government agencies are less likely to trust US-based products. MIP has been designed so that the token vaults can be hosted in any country if local storage and processing is preferred. When firms like Google crawl the Web, only the tokens will be scraped and put into their search results. No tokenized personal information will appear in any search result. Search engines cannot locate tokenized personal information. Other privacy competitors may try to copy MIP, but we're the first firm to say that the less we know about you, the better we can serve you. We're passionate about privacy and want everyone to be protected, so we've priced it at less than an anti-virus product. The consumer version of MIP costs less than $35/year. For enterprise users there are even more challenges, features, and benefits. Introducing for the Enterprise Gartner says that within five years, 90% of businesses will have personal information that they don't own or control, and that it "makes sense to hand over personal data" to a third party for management. The most obvious third party to do this is, of course, the owner of the data. Gartner recommends a "people-centric approach to protecting information." MIP permits companies to start doing this right now. MIP Enterprise includes the following additional features and benefits: Field-level protection provides more granular control, as shown on the left. Two ways to redact tokenized content after it has been disclosed: by deleting its contents or by changing the recipient permissions. This is of special importance to law and accounting firms. In addition to redaction of content, MIP token content can be changed after it has been disclosed. This ensures that price lists, inventory information, newsletters, etc. are never out-of-date. This enables new, simpler dynamic content. Regular Price lists Inventory Newsletters Enterprise-grade hierarchical permissions (such as department groupings) enable the management of sensitive information on a needto-know basis. Optional warnings and auto securing help prevent sensitive data from accidental disclosure. Embedded forensics and a centralized control panel increases visibility and control for the entire enterprise. Redacted Current products cost more than $100/seat/year for just encryption. We want every business to have better security and privacy, so MIP Enterprise will be priced at less than $100/year. Get Started Now For more information, please visit MakeItPrivate.com. The less we know about you, the better we can serve you Page 5

Email Data Security. The dominant business communication tool

Email Data Security. The dominant business communication tool Email Data Security Jim Brashear General Counsel Zix Corporation Dallas Business Uses Email The dominant business communication tool Time spent on email exceeds time spent on all other communication tools

More information

As the US debates email privacy a Berlin start up surges with...

As the US debates email privacy a Berlin start up surges with... TOP STORIES / SCI-TECH DATA PROTECTION As the US debates email privacy a Berlin start up surges with 'anonymous post' No matter how much we say we're angry about the NSA scandal, we still use all the services

More information

Can we maintain Human Rights in Our Cyber Empire?

Can we maintain Human Rights in Our Cyber Empire? Can we maintain Human Rights in Our Cyber Empire? Yvo Desmedt Univ. of Texas at Dallas USA and University College London UK December 11, 2014 c Yvo Desmedt 1. THE INDUSTRIAL EMPIRES The industrial empires

More information

The virtual safe: A user-focused approach to data encryption

The virtual safe: A user-focused approach to data encryption The virtual safe: A user-focused approach to data encryption Steganos GmbH, 2008 1 The hard disk: a snapshot of our lives The personal computer has never been more personal. We routinely trust it with

More information

The Complete Guide to Email Encryption for Google Apps Administrators

The Complete Guide to Email Encryption for Google Apps Administrators The Complete Guide to Email Encryption for Google Apps Administrators virtru.com The Complete Guide to Email Encryption for Google Apps Administrators Alarming increases in security breaches and data leaks,

More information

Securing our information we have the technology; we just have to have the will to do it

Securing our information we have the technology; we just have to have the will to do it Interview with Arjen Kamphuis, information technology specialist Securing our information we have the technology; we just have to have the will to do it Author: Valentina Novak "The hackers need you as

More information

CERT's role in national Cyber Security: policy suggestions

CERT's role in national Cyber Security: policy suggestions CERT's role in national Cyber Security: policy suggestions Subject: Legal Aspect of Cyber Security. Author: Vladimir Chitashvili Lecture: Anna-Maria Osula What is national Cyber Security is? In another

More information

Pretty Good Privacy (PGP)

Pretty Good Privacy (PGP) Pretty Good Privacy (PGP) Contents...1 Abstract...2 Introduction...3 The importance of the cryptography...4 The idea about how (PGP) works...5 Legal issues surrounding (PGP)...6 The implementation and

More information

Clinical Solutions. 2 Hour CEU

Clinical Solutions. 2 Hour CEU 1 2 Hour CEU 2 Course Objectives The purpose of this program is to provide nurses with information about the Health Insurance Portability and Accountability Act (HIPAA), especially as it relates to protected

More information

The Year 2013 Has Become 1984

The Year 2013 Has Become 1984 The Year 2013 Has Become 1984 Saturday, September 21, 2013 23:33 idiscovery Solutions Tom Matzen The Editor interviews Tom Matzen, Director at idiscovery Solutions, in charge of the firm s International

More information

Security and Fraud Exceptions Under Do Not Track. Christopher Soghoian Center for Applied Cybersecurity Research, Indiana University

Security and Fraud Exceptions Under Do Not Track. Christopher Soghoian Center for Applied Cybersecurity Research, Indiana University Security and Fraud Exceptions Under Do Not Track Christopher Soghoian Center for Applied Cybersecurity Research, Indiana University Position Paper for W3C Workshop on Web Tracking and User Privacy 28/29

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

Who Controls Your Information in the Cloud?

Who Controls Your Information in the Cloud? Who Controls Your Information in the Cloud? threat protection compliance archiving & governance secure communication Contents Who Controls Your Information in the Cloud?...3 How Common Are Information

More information

KEEPING PATIENT INFORMATION SAFE AND SECURE IN THE CLOUD

KEEPING PATIENT INFORMATION SAFE AND SECURE IN THE CLOUD CASE STUDY Take Cover The costs of exposing or losing patient information can ruin a dental practice. Cloud-based solutions can protect your business and your patients against these threats: Unauthorized

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

Just Net Coalition statement on Internet governance

Just Net Coalition statement on Internet governance Just Net Coalition statement on Internet governance (Just Net Coalition is a global coalition of civil society actors working on Internet governance issues) All states should work together to provide a

More information

Have you been Reading my Email?

Have you been Reading my Email? Your on the Street Reporter Uyless Black Have you been Reading my Email? Have You Been Reading My Mail? 1 Part One Yesterday, you went to the mailbox to retrieve your letters, bills, and advertisements.

More information

Protecting Backup Media with AES Encryption

Protecting Backup Media with AES Encryption Abstract: Although most businesses scrupulously protect the personal customer information that they collect and store onsite, companies often do not consider the security issues involved when sending backup

More information

Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy

Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy Privacy and data protection in a post-snowden world Carly Nyst Head of International Advocacy The great irony is that we re the only ones not spying on the American people. - Keith Alexander, head of the

More information

Email Privacy 101. A Brief Guide

Email Privacy 101. A Brief Guide Trend Micro, Incorporated A brief guide to adding encryption as an extra layer of security to protect your company in today s high risk email environment. A Trend Micro White Paper I February 2009 A brief

More information

NETWORK SECURITY, REIMAGINED FPO

NETWORK SECURITY, REIMAGINED FPO FPO NETWORK SECURITY, REIMAGINED by Derek Korte AS TENS OF BILLIONS OF NEW DEVICES GET CONNECTED, BUSINESS AND SOCIETY MUST RETHINK SECURITY, PRIVACY, AND OPPORTUNITY Illustration JUSTIN GABBARD Smart

More information

Secure Your Home Computer and Router. Windows 7 Abbreviated Version. LeRoy Luginbill, CISSP

Secure Your Home Computer and Router. Windows 7 Abbreviated Version. LeRoy Luginbill, CISSP Secure Your Home Computer and Router Windows 7 Abbreviated Version LeRoy Luginbill, CISSP TABLE OF CONTENTS Introduction... 2 Getting Ready... 5 Page 1 of 10 Introduction By giving the Introduction and

More information

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 1 Network and cybersecurity vs. access Fundamental tension exists between:

More information

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand

More information

KEEPING UNSTRUCTURED DATA SECURE IN AN UNSTRUCTURED WORLD

KEEPING UNSTRUCTURED DATA SECURE IN AN UNSTRUCTURED WORLD KEEPING UNSTRUCTURED DATA SECURE IN AN UNSTRUCTURED WORLD 2 The most recent study by the Ponemon Institute shows that 90% of CIOs and their staffs interviewed admitted that they have had a leak/loss of

More information

DATA AND PAYMENT SECURITY PART 1

DATA AND PAYMENT SECURITY PART 1 STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

SMALL BUSINESS REPUTATION & THE CYBER RISK

SMALL BUSINESS REPUTATION & THE CYBER RISK SMALL BUSINESS REPUTATION & THE CYBER RISK Executive summary In the past few years there has been a rapid expansion in the development and adoption of new communications technologies which continue to

More information

Cloudy Privacy Computing

Cloudy Privacy Computing Cloudy Privacy Computing Rebecca Herold, CIPP, CISSP, CISA, CISM, FLMI Final Draft for December 2008 CSI Alert Is cloud computing cumulous or cirrus? At Thanksgiving dinner, some of my relatives (none

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

This guide will go through the common ways that a user can make their computer more secure.

This guide will go through the common ways that a user can make their computer more secure. A beginners guide in how to make a Laptop/PC more secure. This guide will go through the common ways that a user can make their computer more secure. Here are the key points covered: 1) Device Password

More information

Privacy in the Cloud: Data Protection and Security in Cloud Computing

Privacy in the Cloud: Data Protection and Security in Cloud Computing SPEECH/11/859 Viviane REDING Vice-President of the European Commission, EU Justice Commissioner Privacy in the Cloud: Data Protection and Security in Cloud Computing Round-table High Level conference on

More information

On- and Off-Line User Interfaces for Collaborative Cloud Services

On- and Off-Line User Interfaces for Collaborative Cloud Services On- and Off-Line User Interfaces for Collaborative Cloud Services Wolfgang Stuerzlinger York University, Dept of Computer Science & Engineering 4700 Keele Street Toronto, Canada http://www.cse.yorku.ca/~wolfgang

More information

Hard vs. Soft Tokens Making the Right Choice for Security

Hard vs. Soft Tokens Making the Right Choice for Security Hard vs. Soft Tokens Making the Right Choice for Security HSTE-NB0012-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com

More information

1 Data Protection Principles

1 Data Protection Principles Today, our personal information is being collected, shared, stored and analysed everywhere. Whether you are browsing the internet, talking to a friend or making an online purchase, personal data collection

More information

The Impact of Wireless LAN Technology on Compliance to the PCI Data Security Standard

The Impact of Wireless LAN Technology on Compliance to the PCI Data Security Standard The Impact of Wireless LAN Technology on to the PCI Data Security Standard 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Wireless LANs and PCI Retailers today use computers

More information

Whitepaper. Best Practices for Securing Your Backup Data. BOSaNOVA Phone: 866-865-5250 Email: info@theq3.com Web: www.theq3.com

Whitepaper. Best Practices for Securing Your Backup Data. BOSaNOVA Phone: 866-865-5250 Email: info@theq3.com Web: www.theq3.com Whitepaper Best Practices for Securing Your Backup Data BOSaNOVA Phone: 866-865-5250 Email: info@theq3.com Web: www.theq3.com DATA PROTECTION CHALLENGE Encryption, the process of scrambling information

More information

LOOKING AT CLOUDS FROM BOTH SIDES NOW

LOOKING AT CLOUDS FROM BOTH SIDES NOW ANALYSIS, ADVANCED KEY POINTS OF THE ARTICLE: LOOKING AT CLOUDS FROM BOTH SIDES NOW WRITTEN BY W. KUAN HON, CHRISTOPHER MILLARD & IAN WALDEN 1/12 SUMMARY 1. Analysis history...3 2. Context...4 3. The evolution

More information

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR Chris Apgar, CISSP 2015 OVERVIEW Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the Right

More information

Five PCI Security Deficiencies of Restaurants

Five PCI Security Deficiencies of Restaurants WHITE PAPER Five PCI Security Deficiencies of Restaurants Five PCI Security Deficiencies of Restaurants The Most Common PCI Compliance Mistakes of Brick-and-Mortar Locations By Bradley K. Cyprus - Chief

More information

details, and numerous other data points. Enough information is often collected that even 2

details, and numerous other data points. Enough information is often collected that even 2 Big Data Study Office of Science and Technology Policy Eisenhower Executive Office Building 650 Pennsylvania Avenue, NW Washington, D.C. 050 VIA E MAIL bigdata@ostp.gov March, 04 Re: Big Data Study, Document

More information

Introduction to Computer Security

Introduction to Computer Security Introduction to Computer Security Rev. Sept 2015 What is Computer Security? 2 Computer Security is the protection of computing systems and the data that they store or access 3 Why is Computer Security

More information

WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline

More information

It may look like this all has to do with your password, but that s not the only factor to worry about.

It may look like this all has to do with your password, but that s not the only factor to worry about. Account Security One of the easiest ways to lose control of private information is to use poor safeguards on internet accounts like web-based email, online banking and social media (Facebook, Twitter).

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies

More information

HIPAA Privacy & Security White Paper

HIPAA Privacy & Security White Paper HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 sabrina@captureproof.com Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements

More information

Data Security. So many businesses leave their data exposed, That doesn t mean you have to. 2014 Computerbilities, Inc.

Data Security. So many businesses leave their data exposed, That doesn t mean you have to. 2014 Computerbilities, Inc. Data Security So many businesses leave their data exposed, That doesn t mean you have to. 2014 Computerbilities, Inc. Table of Contents: 1. Introduction 3 2. Cybersecurity: The loopholes in the system

More information

Software License Management using the Polymorphic Encryption Algorithm White Paper

Software License Management using the Polymorphic Encryption Algorithm White Paper pmc-ciphers.com Software License Management using the Polymorphic Encryption Algorithm White Paper Published: May 2007, first published in January 2003 PMC Software License Management 1 Software License

More information

Presented by Evan Sylvester, CISSP

Presented by Evan Sylvester, CISSP Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information

More information

SecureCom Mobile s mission is to help people keep their private communication private.

SecureCom Mobile s mission is to help people keep their private communication private. About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended

More information

CSR Breach Reporting Service Frequently Asked Questions

CSR Breach Reporting Service Frequently Asked Questions CSR Breach Reporting Service Frequently Asked Questions Quick and Complete Reporting is Critical after Data Loss Why do businesses need this service? If organizations don t have this service, what could

More information

WHITE PAPER. PCI Basics: What it Takes to Be Compliant

WHITE PAPER. PCI Basics: What it Takes to Be Compliant WHITE PAPER PCI Basics: What it Takes to Be Compliant Introduction A long-running worldwide advertising campaign by Visa states that the card is accepted everywhere you want to be. Unfortunately, and through

More information

How Do People Use Security in the Home

How Do People Use Security in the Home How Do People Use Security in the Home Kaarlo Lahtela Helsinki University of Technology Kaarlo.Lahtela@hut.fi Abstract This paper investigates home security. How much people know about security and how

More information

Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements

Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Cecilia Wirfelt Louise Wallin Email: {cecwi155, louwa538}@student.liu.se Supervisor: Jan-Åke Larsson,

More information

Reprinted with permission from the January 2004 issue of the Intellectual Property & Technology Law Journal.

Reprinted with permission from the January 2004 issue of the Intellectual Property & Technology Law Journal. Reprinted with permission from the January 2004 issue of the Intellectual Property & Technology Law Journal. Beyond the NDA: Digital Rights Management Isn t Just for Music By Adam Petravicius and Joseph

More information

WHAT INFORMATION IS COLLECTED AT MOTOROLA.COM.VN AND/OR MOTOROLA.VN AND HOW IS IT PROCESSED AND USED?

WHAT INFORMATION IS COLLECTED AT MOTOROLA.COM.VN AND/OR MOTOROLA.VN AND HOW IS IT PROCESSED AND USED? MOTOROLA PRIVACY POLICY This Privacy Statement ( Policy ) is subject to change at Motorola s discretion. If we decide to change this Policy, we will post the amended Policy on this website so you will

More information

What Are Certificates?

What Are Certificates? The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form

More information

Privacy Policy for culinarydreamsinc.com

Privacy Policy for culinarydreamsinc.com Privacy Policy for culinarydreamsinc.com This privacy policy has been compiled to better serve those who are concerned with how their 'Personally identifiable information' (PII) is being used online. PII,

More information

White Paper: Are there Payment Threats Lurking in Your Hospital?

White Paper: Are there Payment Threats Lurking in Your Hospital? White Paper: Are there Payment Threats Lurking in Your Hospital? With all the recent high profile stories about data breaches, payment security is a hot topic in healthcare today. There s been a steep

More information

PHI- Protected Health Information

PHI- Protected Health Information HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson

More information

Email and Security. U3A Radlett Computer Group Meeting 6-Oct-2014 V1.1

Email and Security. U3A Radlett Computer Group Meeting 6-Oct-2014 V1.1 Email and Security U3A Radlett Computer Group Meeting 6-Oct-2014 V1.1 Agenda Introduction Email Security Q&A Introduction Gary Harding email:- U3A@GaryHarding.com Spent more than 40 years working in the

More information

PCI Compliance Are you at Risk? September 17, 2014 Dan Garrett/Matt Fluegge Vantiv

PCI Compliance Are you at Risk? September 17, 2014 Dan Garrett/Matt Fluegge Vantiv PCI Compliance Are you at Risk? September 17, 2014 Dan Garrett/Matt Fluegge Vantiv Security Challenges Desirability of Data 80% of all data breaches is payment card data (Verizon RISK team assessment)

More information

Elo Touch Solutions Privacy Policy

Elo Touch Solutions Privacy Policy Elo Touch Solutions Privacy Policy Your privacy is very important to us. At Elo Touch Solutions, Inc. ( Elo, we or us which includes any of our worldwide direct and indirect subsidiaries), we recognize

More information

Green Pharm is committed to your privacy. We disclose our information practices below and we agree to notify you of:

Green Pharm is committed to your privacy. We disclose our information practices below and we agree to notify you of: Privacy Policy is committed to your privacy. We disclose our information practices below and we agree to notify you of: 1. What personally identifiable information of yours or third party personally identification

More information

Professional Ethics for Computer Science

Professional Ethics for Computer Science Professional Ethics for Computer Science Chapter 4: Privacy Jie Gao Computer Science Department Stony Brook University Privacy Issues Internet privacy consists of privacy over the media of the Internet:

More information

Data Storage on Mobile Devices Introduction to Computer Security Final Project

Data Storage on Mobile Devices Introduction to Computer Security Final Project Data Storage on Mobile Devices Introduction to Computer Security Final Project Katina Russell Tufts University, Fall 2014 Abstract While people come up with ideas about a mobile application to create,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

The Evolution of Data Breaches

The Evolution of Data Breaches The Evolution of Data Breaches 2015 Data Privacy & Security Summit June 29, 2015 Mark Shelhart Incident Response & Forensics Retail Data Security recent victims The Largest Cyber Risks to your Organization

More information

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious

More information

ITAR Compliance Best Practices Guide

ITAR Compliance Best Practices Guide ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations

More information

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed

More information

What personal information do we collect from the people that visit our blog, website or app?

What personal information do we collect from the people that visit our blog, website or app? Privacy Policy This privacy policy has been compiled to better serve those who are concerned with how their 'Personally identifiable information' (PII) is being used online. PII, as used in US privacy

More information

nexusfordevelopment.org Privacy Policy

nexusfordevelopment.org Privacy Policy nexusfordevelopment.org Privacy Policy This privacy policy has been compiled to better serve those who are concerned with how their 'Personally identifiable information' (PII) is being used online. PII,

More information

Module 2 Cloud Computing

Module 2 Cloud Computing 1 of 9 07/07/2011 17:12 Module 2 Cloud Computing Module 2 Cloud Computing "Spending on IT cloud services will triple in the next 5 years, reaching $42 billion worlwide." In cloud computing, the word "cloud"

More information

HIPAA Myths. WEDI Regional Affiliates. Chris Apgar, CISSP Apgar & Associates

HIPAA Myths. WEDI Regional Affiliates. Chris Apgar, CISSP Apgar & Associates HIPAA Myths WEDI Regional Affiliates Chris Apgar, CISSP Apgar & Associates Overview Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the

More information

HIPAA SECURITY AWARENESS

HIPAA SECURITY AWARENESS April, 2005 HIPAA SECURITY AWARENESS Department of Mental Health, Mental Retardation, and Substance Abuse Services What is HIPAA? HIPAA means Health Insurance Portability and Accountability Act It is a

More information

S E A h a w k C r y p t o M i l l CryptoMill Technologies Ltd. www.cryptomill.com

S E A h a w k C r y p t o M i l l CryptoMill Technologies Ltd. www.cryptomill.com SEAhawk CryptoMill CryptoMill Technologies Ltd. www.cryptomill.com OVERVIEW S EAhawk is an endpoint and removable storage security solution for desktop PCs and laptops running the Microsoft Windows operating

More information

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013 INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

PCI Security Compliance in KANA Solutions How KANA Applications Helps Companies Comply with PCI Security Standards

PCI Security Compliance in KANA Solutions How KANA Applications Helps Companies Comply with PCI Security Standards PCI Security Compliance in KANA Solutions How KANA Applications Helps Companies Comply with PCI Security Standards Table of Contents PCI Security Compliance in KANA Solutions...1 The Importance of Protecting

More information

The Evolving Threat Landscape and New Best Practices for SSL

The Evolving Threat Landscape and New Best Practices for SSL The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...

More information

Five PCI Security Deficiencies of Retail Merchants and Restaurants

Five PCI Security Deficiencies of Retail Merchants and Restaurants Whitepaper January 2010 Five PCI Security Deficiencies of Retail Merchants and Restaurants The Most Common PCI Compliance Mistakes of Brick-and-Mortar Locations by Brad Cyprus, SSCP - Senior Security Architect,

More information

SSL. Secure Sockets Layer. - a short summary - By Christoph Gutmann and Khôi Tran

SSL. Secure Sockets Layer. - a short summary - By Christoph Gutmann and Khôi Tran SSL Secure Sockets Layer - a short summary - By Christoph Gutmann and Khôi Tran Page 1 / 7 Table of contents 1. Brief historic outline of SSL 2. Why did SSL come to life? 3. How does SSL work? 4. Where

More information

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360. Norton 360 Our ultimate protection, now even more so. Introducing the new Norton 360. Our ultimate Internet and antivirus protection for all you do online Provides proactive protection, so you can do what

More information

HIPAA Myths. WEDI Member Town Hall. Chris Apgar, CISSP Apgar & Associates

HIPAA Myths. WEDI Member Town Hall. Chris Apgar, CISSP Apgar & Associates HIPAA Myths WEDI Member Town Hall Chris Apgar, CISSP Apgar & Associates Overview Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the Right

More information

Privacy, the Cloud and Data Breaches

Privacy, the Cloud and Data Breaches Privacy, the Cloud and Data Breaches Annelies Moens Head of Sales and Operations, Information Integrity Solutions Legalwise Seminars Sydney, 20 March 2013 About IIS Building trust and privacy through global

More information

Keren Elazari Hackers: The Internet s Immune System

Keren Elazari Hackers: The Internet s Immune System Keren Elazari Hackers: The Internet s Immune System For the past three decades, hackers have done a lot of things, but they have also impacted civil liberties, innovation and Internet freedom, so I think

More information

Shouldn't They Be Getting Better At This? The Unending Spear Phishing. Joel Anderson University Information Security

Shouldn't They Be Getting Better At This? The Unending Spear Phishing. Joel Anderson University Information Security Shouldn't They Be Getting Better At This? The Unending Spear Phishing Joel Anderson University Information Security Or... Why DO Nigerian Scammers Say They are from Nigeria? First, what you already know

More information

Political Committee and Political Fund Handbook Last Revised 7/2/2015

Political Committee and Political Fund Handbook Last Revised 7/2/2015 Minnesota Campaign Finance and Public Disclosure Board www.cfboard.state.mn.us (651) 539-1180 (800) 657-3889 Political Committee and Political Fund Handbook Last Revised 7/2/2015 Welcome... 3 Starting

More information

AB 1149 Compliance: Data Security Best Practices

AB 1149 Compliance: Data Security Best Practices AB 1149 Compliance: Data Security Best Practices 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: AB 1149 is a new California

More information

Replicated Website & Back-Office Privacy Policy

Replicated Website & Back-Office Privacy Policy Replicated Website & Back-Office Privacy Policy EFFECTIVE DECEMBER 1, 2015 WEALTH GENERATORS LLC 12 SOUTH 400 WEST SALT LAKE CITY UT 84101 801.939.3580 WWW.WEALTHGENERATORS.COM Wealth Generators LLC Replicated

More information

Email Security in Law Firms. What you need to know and how you can use secure email to win more clients

Email Security in Law Firms. What you need to know and how you can use secure email to win more clients Email Security in Law Firms What you need to know and how you can use secure email to win more clients Introduction As clients are demanding greater protection of their information, law firms must incorporate

More information

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows: What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers

More information

Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.

Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10. Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate A STEP-BY-STEP GUIDE to test, install and use a thawte Digital Certificate on your MS IIS Web

More information

The threats which were perceivable 20 years ago differ greatly from our ever increasing

The threats which were perceivable 20 years ago differ greatly from our ever increasing 1 Introduction The threats which were perceivable 20 years ago differ greatly from our ever increasing interconnected world of the present. With these new found risks there becomes the need for a different

More information

Cyber Threats: Exposures and Breach Costs

Cyber Threats: Exposures and Breach Costs Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals

More information

Leonardo Hotels Group Page 1

Leonardo Hotels Group Page 1 Privacy Policy The Leonardo Hotels Group, represented by Sunflower Management GmbH & Co.KG, respects the right to privacy of every individual who access and navigate our website. Leonardo Hotels takes

More information

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security

More information

How To Protect Visa Account Information

How To Protect Visa Account Information Account Information Security Merchant Guide At Visa, protecting our cardholders is at the core of everything we do. One of the many reasons people trust our brand is that we make buying and selling safer

More information

Risk Analysis in Skype Software Security

Risk Analysis in Skype Software Security Risk Analysis in Skype Software Security Afnan AlOmrani, Rasheed AlZahrani, Eyas ElQawasmeh Information System Department College of Computer and Information Sciences King Saud University Riyadh, Saudi

More information