TechR2

The Cost of a Data Breach

A malicious attack (hacking, stealing, etc) can cost up to 25% more than a non-malicious attack. However, most data breaches occur due to the negligence from within the organization. This includes, the loss of a mobile device (cell phone, external hard drive), unsecured storage of retired computers, hard drives, and other data bearing devices. Here are a few examples of some recent data breaches that are a product of improper disposal and lost media devices.

Mobile Device Management: The New Frontier in IT Security

Mobile devices have changed the landscape of IT asset management and data security policies. IT managers now have to develop and implement new processes to help to manage, control, and properly dispose of these devices. The biggest hurdle with this is the shifting of power from the IT department to the employees themselves, this introduces a myriad of new risks. Risks such as corporate data available outside of a physical establishment as well as developing strategies for all makes of devices and operating systems.

Does Your Company Have the Same IT Security Lapses as the VA?

Later this month, the inspector general of the U.S. Department of Veterans Affairs will release a security audit that identifies the IT weaknesses of non-classified government agencies, according to Data Breach Today. Surprisingly, the audit confirmed cyberthreats to the VA from both domestic and international hosts.

However, an expert quoted in the article noted that the same lapses uncovered at the VA are also prevalent in the private sector, and blamed a lack of education for failure to commit to basic security measures.

ISO 27001: What Does It Mean & Why is it Important?

ISO 27001: What Does It Mean & Why is it Important? [vc_row][vc_column width=”1/3″][vc_column_text] We’re proud to announce that TechR2 has received ISO 27001 Certification. We’re very excited about this step forward, but what does it all mean? [/vc_column_text][/vc_column][vc_column width=”1/3″][vc_column_text]The International Organization for Standardization (ISO) provides globally recognized management standards to the electronics recycling industry on […]

Tear-A-Byte®, The patented exclusive onsite data eradication solution by TechR2

Tear-A-Byte®, The patented exclusive onsite data eradication solution by TechR2 Do you know where your hard drives go at night? The #1 cause of large-scale data breaches is the loss of data-bearing media. Data breaches have become a major concern in every business and industry, from healthcare to education, banking to retail, costing a company […]

Lessons Learned at Business of Security Event

Lessons Learned at Business of Security Event Last week members of the TechR2 team had the opportunity to interact with a group of seasoned Information Security leaders at a Business of Security networking event. We had a great time learning from special guests: Cindi Hart, Kim L. Jones, Kent King, Larry Mead, Mike Scott, and […]

Is your CEO criminally liable if discarded data devices aren’t clean?

Is your CEO criminally liable if discarded data devices aren’t clean? IT professionals are often frustrated by CEOs and corporate executives who don’t prioritize data security. This is frequently a case of priorities and personalities rather than rational decision making. Last week we wrote about corporate executives imprisoned for improper disposal of technology waste. This […]

Patient data safety: Don’t leave it to the laundry department!

Patient data safety: Don’t leave it to the laundry department! Twice this spring, sensitive medical data from major New York hospitals were copied onto flash drives, exposing patient medical data to anyone who might find the drives. These were not spent server hard drives or sophisticated backup drives. These were simple flash drives — the […]

FTC Alleges Data Breach: Is your medical data secure?

FTC Alleges Data Breach: Is your medical data secure? It was a double whammy for the medical data company. LabMD, a medical laboratory, had exposed the personal information of nearly 10,000 of its customers on a file-sharing network, according to an article published recently on CIO.com. The misstep doesn’t necessarily mean that the information was […]

After a data breach, an insurance company doesn’t know what hit them.

After a data breach, an insurance company doesn’t know what hit them. Really? A large insurance company had to hire a legal firm as part of an investigation of their own data security system. Last fall the insurance giant fell victim to a cyber attack, which compromised the personal information of over a million customers […]